[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26748 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a TLS message containing multiple Client Hello messages. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a integer signedness error vulnerability. The flaw is present in the application, which does not properly handle a certain integer value in the random field. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a malicious library under the modules/ or plugins/ subdirectories of the current working directory. Successful exploitation allows local users to execute arbitrary code.

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a zero value for the length of Server Names, which leads to a buffer overflow. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with OpenSSL 0.9.8f or 0.9.8g and is prone to double free vulnerability. A flaw is present in the application, which fails to properly handle a malformed Client Hello packet. Successful exploitation could allow remote attackers to cause a denial of service (crash).

The host is installed with Audacity 1.2.6 before 1.3.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a .gro file containing a long string. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apache Tomcat 5.5.0 through 5.5.28 or 6.0.0 through 6.0.20 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails handle a .. (dot dot) in an entry in a WAR file. Successful exploitation allows remote attackers to create or overwrite arbitrary files.

Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow.

The host is installed with Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.26 or 7.0.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails handle a crafted header. Successful exploitation allows remote attackers to cause a denial of service (application outage) or obtain sensitive information.

The host is installed with Apache Tomcat 7.0.x before 7.0.17 and is prone to unspecified vulnerability. A flaw is present in the application, which fails handle a crafted application. Successful exploitation allows remote attackers to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target appl ...


Pages:      Start    1534    1535    1536    1537    1538    1539    1540    1541    1542    1543    1544    1545    1546    1547    ..   2674

© SecPod Technologies