[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11843 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted SFNT string in a Type 42 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted property data in a PCF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the cell table of a font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted private-dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors involving the NPUSHB and NPUSHW instructions in a TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font that lacks an ENCODING field. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted header in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors involving the MIRP instruction in a TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).


Pages:      Start    1161    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    1172    1173    1174    ..   1184

© 2013 SecPod Technologies