[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with VideoLAN VLC Media Player 2.2.1 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted 3GP file. Successful exploitation allows attackers to crash the service or execute arbitrary code.

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly terminate a data structure after a failure to locate a number within a string. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size. Successful exploitation allows remote attackers to cause a denial of service (incorrect free operation and application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles table searches for empty strings. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly relies on length fields contained in packet data. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which uses incorrect integer data types. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles large tag values. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate a certain offset value. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not check whether the expected amount of data is available. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses. Successful exploitation allows remote attackers to cause a denial of service (application crash).


Pages:      Start    1181    1182    1183    1184    1185    1186    1187    1188    1189    1190    1191    1192    1193    1194    ..   1502

© SecPod Technologies