[Forgot Password]
Login  Register Subscribe

23631

 
 

126995

 
 

100182

 
 

909

 
 

80298

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 14491 Download | Alert*

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted SFNT string in a Type 42 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted property data in a PCF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the cell table of a font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption).

The host is installed with Ruby on Rails 3.0.x before 3.0.12 or 3.1.x before 3.1.4 or 3.2.x before 3.2.2 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to sufficiently sanitize user-supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, or SeaMonkey before 2.9 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle the nsSVGFEDiffuseLightingElement::LightPixel function. Successful exploitation could allow attacke ...

The host is installed with Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, or SeaMonkey before 2.9 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle multibyte character set. Successful exploitation could allow attackers to inject arbitrary web script or ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1449

© 2013 SecPod Technologies