The host is installed with Trillian before 3.1.10.0 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message. Successful exploitation could allow attackers to to execute arbitrary code.
The host is installed with Trillian before 3.1.12.0 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long image filename. Successful exploitation could allow attackers to to execute arbitrary code.
The host is installed with Trillian before 3.1.12.0 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle a crafted XML expression. Successful exploitation could allow attackers to to execute arbitrary code.
The host is installed with Trillian before 3.1.12.0 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to verify a malformed XML tag. Successful exploitation could allow attackers to to execute arbitrary code.
The host is installed with UltraVNC 1.0.8.2 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse vnclang.dll file in the current working directory. Successful exploitation could allow local users to gain privileges.
The host is installed with UltraVNC 1.0.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a modified size value. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with UltraVNC 1.0.2 and is prone to multiple stack-based buffer overflow vulnerabilities. A flaw is present in the application, which fails to handle unspecified parameters. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with UltraVNC 1.0.2, 1.0.5 or TightVnc 1.3.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a large length value in a message. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with VideoLAN VLC Media Player 1.1.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a specially-crafted .amr file. Successful exploitation could allow attackers to cause crash of application.
The host is installed with VideoLAN VLC Media Player before 2.0.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted playlist file, Successful exploitation allows attackers to cause a denial of service (memory consumption).