Download
| Alert*
oval:org.secpod.oval:def:16011
The host is installed with VideoLAN VLC media player 2.0.8 or earlier and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to handle a long string in a URL in a m3u file. Successful exploitation allows remote attackers to cause a denial of service (crash) ... oval:org.secpod.oval:def:2042 The host is installed with VideoLAN VLC media player 1.1.x before 1.1.11, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the DemuxAudioSipr function in real.c in the RealMedia demuxer in the application, which fails to validate user supplied input. Successful exploi ... oval:org.secpod.oval:def:2043 The host is installed with VideoLAN VLC media player 0.5.0 through 1.1.10, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the AVI_ChunkRead_strf function in libavi.c in the AVI demuxer in the application, which fails to sanitize user supplied input. Successful explo ... oval:org.secpod.oval:def:1980 The host is installed with VideoLAN VLC media player 1.1.x before 1.1.11, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the DemuxAudioSipr function in real.c in the RealMedia demuxer in the application, which fails to validate user supplied input. Successful exploi ... oval:org.secpod.oval:def:1981 The host is installed with VideoLAN VLC media player 0.5.0 through 1.1.10, and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the AVI_ChunkRead_strf function in libavi.c in the AVI demuxer in the application, which fails to sanitize user supplied input. Successful explo ... oval:org.secpod.oval:def:16939 The host is installed with VideoLAN VLC Media Player before 2.1.3 and is prone to divide-by-zero error vulnerability. A flaw is present in the application, which fails to handle a zero minimum and maximum data packet size in an ASF file. Successful exploitation allows attackers to cause a denial of ... oval:org.secpod.oval:def:16869 The host is installed with vlc media player before 0.9.0 through 1.1.12 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle a crafted TiVo (TY) file. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:6387 The host is installed with VideoLAN VLC media player before 2.0.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted OGG file. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4835 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MMS:// stream. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:4833 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MMS:// stream. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:4834 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Real RTSP stream. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:4836 The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Real RTSP stream. Successful exploitation could allow attackers to crash the service. |