[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26684 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation allows attackers to cause a denial of service.

The host is installed with OpenSSL 0.9.8f or 0.9.8g and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference. Successful exploitation could allow remote attackers to cause a denial of service (crash).

The host is installed with OpenSSL 0.9.8i and earlier and is prone to signature verification vulnerability. A flaw is present in the application, which does not properly check the return value from the EVP_VerifyFinal function. Successful exploitation could allow remote attackers to bypass validation of the certificate chain.

The host is installed with Apache Tomcat 5.5.0 through 5.5.26 or 6.0.0 through 6.0.16 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails handle the cookie in an https session. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apache Tomcat 5.5.0 through 5.5.26 or 6.0.0 through 6.0.16 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails handle the name parameter to host-manager/html/add. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apache Tomcat 5.5.0 through 5.5.26 or 6.0.0 through 6.0.16 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails handle a .. (dot dot) in a request parameter. Successful exploitation allows remote attackers to conduct directory traversal attacks and read arbitrary files.

The host is installed with vlc media player 0.9.0 through 0.9.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a TiVo TY media file with a header containing a crafted size value. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with vlc media player 0.9.0 through 0.9.4 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted .ty file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with vlc media player 0.5.0 through 0.9.5 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the header of an invalid CUE image file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to multiple integer overflows vulnerability. The flaws are present in the application, which does not properly handle the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec. Successful exploitation allows remote attackers to cause a denial of service (crash).


Pages:      Start    1624    1625    1626    1627    1628    1629    1630    1631    1632    1633    1634    1635    1636    1637    ..   2668

© SecPod Technologies