[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26416 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted header in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PostScript font object. Successful exploitation allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ASCII string in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph-outline data in a font. Successful exploitation allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with Ghostscript 8.62 or earlier and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse Postscript library file. Successful exploitation could allow users to execute arbitrary PostScript code.

The host is installed with Spring Cloud Function through 3.1.6 or 3.2.x through 3.2.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a routing functionality issue. Successful exploitation could allows attackers to provide a specially crafted SpEL as a routing-expression which may result in remote code execution and access ...

The host is installed with Atlassian Jira Server before 8.5.14, 8.6.0 before 8.13.6 or 8.14.0 before 8.16.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle an issue in the EditWorkflowScheme.jspa component. Successful exploitation could allow attackers to inject arbitrary HTML or JavaScript.


Pages:      Start    1696    1697    1698    1699    1700    1701    1702    1703    1704    1705    1706    1707    1708    1709    ..   2641

© SecPod Technologies