[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10687 Download | Alert*

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to an invalid memory access vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player before 2.2.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted path info. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with VLC Media Player 1.1.9 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed AMV file. Successful exploitation allows remote attacker to cause a denial of service (memory corruption) or possibly execute arbitrary code.

The host is installed with VLC Media Player 2.1.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted .png file, as demonstrated by a png in a .wave file. Successful exploitation allows remote attacker to cause a denial of service (crash).

The host is installed with ALFTP before 5.31 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to load executable files properly. Successful exploitation could allow local users to gain privileges of via a Trojan horse executable file.

The host is installed with Microsoft OneNote and is prone to remote code execution vulnerability. A flaw is present in application, which parses specially crafted files. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights."

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to eval injection vulnerability. A flaw is present in the application, which fails to handle a crafted application/x-amf request. Successful exploitation allows remote attackers to execute arbitrary Perl code.

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in a log pathname. Successful exploitation allows remote authenticated users to create or overwrite arbitrary files.

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted application/x-amf request that does not require authentication for the modifyAccounts method. Successful exploitation allows remote attackers to change the passwords of administrative accounts.


Pages:      Start    1048    1049    1050    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    ..   1068

© 2013 SecPod Technologies