Download
| Alert*
oval:org.secpod.oval:def:16011
The host is installed with VideoLAN VLC media player 2.0.8 or earlier and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to handle a long string in a URL in a m3u file. Successful exploitation allows remote attackers to cause a denial of service (crash) ... oval:org.secpod.oval:def:608 The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused by a memory corruption error in the "libdirectx" plugin when processing malformed NSV data. Successful exploitation allows remote atta ... oval:org.secpod.oval:def:607 The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused due to an error when processing video files with large dimensions. Successful exploitation could allow remote attackers to overflow a ... oval:org.secpod.oval:def:2042 The host is installed with VideoLAN VLC media player 1.1.x before 1.1.11, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the DemuxAudioSipr function in real.c in the RealMedia demuxer in the application, which fails to validate user supplied input. Successful exploi ... oval:org.secpod.oval:def:2043 The host is installed with VideoLAN VLC media player 0.5.0 through 1.1.10, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the AVI_ChunkRead_strf function in libavi.c in the AVI demuxer in the application, which fails to sanitize user supplied input. Successful explo ... oval:org.secpod.oval:def:1980 The host is installed with VideoLAN VLC media player 1.1.x before 1.1.11, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the DemuxAudioSipr function in real.c in the RealMedia demuxer in the application, which fails to validate user supplied input. Successful exploi ... oval:org.secpod.oval:def:1981 The host is installed with VideoLAN VLC media player 0.5.0 through 1.1.10, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the AVI_ChunkRead_strf function in libavi.c in the AVI demuxer in the application, which fails to sanitize user supplied input. Successful explo ... oval:org.secpod.oval:def:838 The host is installed with VLC Media Player before 1.1.9 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application which is caused by improper bounds checking by the MP4_ReadBox_skcr() function. Successful exploitation allows remote attacker to overflow a buffer ... oval:org.secpod.oval:def:126 The host is installed with VideoLAN VLC Media Player before 1.1.7 and is prone to Denial of service vulnerability. A flaw is present in the MKV demuxer plugin in VideoLAN VLC media player, which fails to validate input within the "MKV_IS_ID" macro in modules/demux/mkv/mkv.hpp of the MKV demuxer. Suc ... oval:org.secpod.oval:def:16939 The host is installed with VideoLAN VLC Media Player before 2.1.3 and is prone to divide-by-zero error vulnerability. A flaw is present in the application, which fails to handle a zero minimum and maximum data packet size in an ASF file. Successful exploitation allows attackers to cause a denial of ... oval:org.secpod.oval:def:16869 The host is installed with vlc media player before 0.9.0 through 1.1.12 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle a crafted TiVo (TY) file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:6387 The host is installed with VideoLAN VLC media player before 2.0.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted OGG file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4835 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MMS:// stream. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:4833 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MMS:// stream. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:4834 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Real RTSP stream. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4836 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Real RTSP stream. Successful exploitation could allow attackers to crash the service. |