[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11397 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted SFNT string in a Type 42 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted property data in a PCF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the cell table of a font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted private-dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors involving the NPUSHB and NPUSHW instructions in a TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font that lacks an ENCODING field. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted header in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).


Pages:      Start    1118    1119    1120    1121    1122    1123    1124    1125    1126    1127    1128    1129    1130    1131    ..   1139

© 2013 SecPod Technologies