[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195326 Download | Alert*

It was discovered that crashes in the Javascript engine of Iceweasel, an unbranded version of the Firefox browser, could potentially lead to the execution of arbitrary code.

It was discovered that crashes in the JavaScript engine of Iceape, an unbranded version of the Seamonkey internet suite could potentially lead to the execution of arbitrary code.

It was discovered that crashes in the Javascript engine of xulrunner, the Gecko engine library, could potentially lead to the execution of arbitrary code.

Several remote vulnerabilities have been discovered in GNUTLS, an implementation of the SSL/TLS protocol suite. NOTE: The libgnutls13 package, which provides the GNUTLS library, does not contain logic to automatically restart potentially affected services. You must restart affected services manually (mainly Exim, using /etc/init.d/exim4 restart) after applying the update, to make the changes fully ...

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a TLS message containing multiple Client Hello messages. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a integer signedness error vulnerability. The flaw is present in the application, which does not properly handle a certain integer value in the random field. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a malicious library under the modules/ or plugins/ subdirectories of the current working directory. Successful exploitation allows local users to execute arbitrary code.

Flaws discovered in versions prior to 2.2.4 and 2.3.10 of GnuTLS allow an attacker to cause denial of service , and maybe execute arbitrary code. The updated packages have been patched to fix these flaws. Note that any applications using this library must be restarted for the update to take effect.

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a zero value for the length of Server Names, which leads to a buffer overflow. Successful exploitation allows remote attackers to cause a denial of service (crash).

Testing using the Codenomicon TLS test suite discovered a flaw in the handling of server name extension data in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause a crash. Testing using the Codenomicon TLS test suite discovered a fl ...


Pages:      Start    9135    9136    9137    9138    9139    9140    9141    9142    9143    9144    9145    9146    9147    9148    ..   19532

© SecPod Technologies