[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194669 Download | Alert*

A format string vulnerability in the grant helper, in PolicyKit 0.7 and earlier, allows attackers to cause a denial of service and possibly execute arbitrary code via format strings in a password. The updated package has been patched to correct this issue.

Security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program, version 2.0.0.14. This update provides the latest Firefox to correct these issues.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to a denial of service vulnerability. The flaw is present in the application, which does not properly handle a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption. Successful exploitation allows remote attackers to cause a denial of service (crash).

It was discovered that crashes in the Javascript engine of Iceweasel, an unbranded version of the Firefox browser, could potentially lead to the execution of arbitrary code.

It was discovered that crashes in the JavaScript engine of Iceape, an unbranded version of the Seamonkey internet suite could potentially lead to the execution of arbitrary code.

It was discovered that crashes in the Javascript engine of xulrunner, the Gecko engine library, could potentially lead to the execution of arbitrary code.

Several remote vulnerabilities have been discovered in GNUTLS, an implementation of the SSL/TLS protocol suite. NOTE: The libgnutls13 package, which provides the GNUTLS library, does not contain logic to automatically restart potentially affected services. You must restart affected services manually (mainly Exim, using /etc/init.d/exim4 restart) after applying the update, to make the changes fully ...

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a TLS message containing multiple Client Hello messages. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a integer signedness error vulnerability. The flaw is present in the application, which does not properly handle a certain integer value in the random field. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6g and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a malicious library under the modules/ or plugins/ subdirectories of the current working directory. Successful exploitation allows local users to execute arbitrary code.


Pages:      Start    9147    9148    9149    9150    9151    9152    9153    9154    9155    9156    9157    9158    9159    9160    ..   19466

© SecPod Technologies