[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly handle a zero value for codebook.dim. Successful exploitation allows remote attackers to cause a denial of service (crash or infinite loop).

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to integer overflow vulnerability. A flaw is present in the application, which does not properly handle a crafted OGG file, which triggers a heap overflow. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to integer overflow vulnerability. A flaw is present in the application, which does not properly handle a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6e and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle long Session Description Protocol (SDP) data. Successful exploitation allows attackers to cause a denial of service.

The host is installed with VideoLAN VLC Media Player 0.8.6d and earlier and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long string. Successful exploitation allows attackers to cause a denial of service.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to integer overflow vulnerability. A flaw is present in the application, which does not properly handle a crafted MP4 RDRF box that triggers a heap-based buffer overflow. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with OpenVPN before 2.5.3 and is prone to uncontrolled search path element vulnerability. The flaw is present in the application, which fails to properly handle an issue in the OpenSSL configuration file. Successful exploitation could allow attackers to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the attackers to run ar ...

The host is installed with OpenSSL 0.9.8h through 0.9.8j and is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle errors associated with malformed signed attributes. Successful exploitation could allow remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.

The host is installed with OpenSSL 0.9.8 and is prone to man-in-the-middle attack vulnerability. A flaw is present in Diffie-Hellman key-exchange implementation in OpenSSL, which does not properly validate a public parameter. Successful exploitation makes it easier for man-in-the-middle attackers to obtain the shared secret key.

The host is installed with Oracle VM VirtualBox before 5.1.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect Confidentiality.


Pages:      Start    1287    1288    1289    1290    1291    1292    1293    1294    1295    1296    1297    1298    1299    1300    ..   1429

© SecPod Technologies