[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10323 Download | Alert*

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to an invalid memory access vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player before 2.2.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted path info. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with VLC Media Player 1.1.9 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed AMV file. Successful exploitation allows remote attacker to cause a denial of service (memory corruption) or possibly execute arbitrary code.

The host is installed with VLC Media Player 2.1.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted .png file, as demonstrated by a png in a .wave file. Successful exploitation allows remote attacker to cause a denial of service (crash).

The host is installed with Microsoft OneNote and is prone to remote code execution vulnerability. A flaw is present in application, which parses specially crafted files. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights."

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to eval injection vulnerability. A flaw is present in the application, which fails to handle a crafted application/x-amf request. Successful exploitation allows remote attackers to execute arbitrary Perl code.

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in a log pathname. Successful exploitation allows remote authenticated users to create or overwrite arbitrary files.


Pages:      Start    1013    1014    1015    1016    1017    1018    1019    1020    1021    1022    1023    1024    1025    1026    ..   1032

© 2013 SecPod Technologies