Page 12 of 63 results (0.004 seconds)

CVSS: 9.3EPSS: 4%CPEs: 67EXPL: 0

Multiple heap-based buffer overflows in cdg.c in the CDG decoder in VideoLAN VLC Media Player before 1.1.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted CDG video. Múltiples desbordamientos de búfer de la memoria dinámica en cdg.c del descodificador CDG para VideoLAN VLC Media Player anterior a v1.1.6 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código de su elección a través de un vídeo CDG manipulado • http://download.videolan.org/pub/videolan/vlc/1.1.6/vlc-1.1.6.tar.bz2 http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab http://openwall.com/lists/oss-security/2011/01/19/6 http://openwall.com/lists/oss-security/2011/01/20/3 http://www.securityfocus.com/bid/45927 http://www.vupen.com/english/advisories/2011/0185 https://exchange.xforce.ibmcloud.com/vulnerabilities/64879 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 5%CPEs: 67EXPL: 0

Multiple integer overflows in real.c in the Real demuxer plugin in VideoLAN VLC Media Player before 1.1.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a zero i_subpackets value in a Real Media file, leading to a heap-based buffer overflow. Múltiples desbordamientos de entero en real.c en el complemento Real demuxer en VideoLAN VLC Media Player anterior a v1.1.6 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código de su elección a través de un valor cero i_subpackets en un archivo de Real Media, que conduce a un desbordamiento de búfer basado en montón .. • http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=6568965770f906d34d4aef83237842a5376adb55 http://www.cs.brown.edu/people/drosenbe/research.html http://www.securityfocus.com/bid/45632 http://www.videolan.org/security/sa1007.html http://www.vupen.com/english/advisories/2010/3345 https://exchange.xforce.ibmcloud.com/vulnerabilities/64461 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13950 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 51%CPEs: 65EXPL: 2

Untrusted search path vulnerability in bin/winvlc.c in VLC Media Player 1.1.3 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll that is located in the same folder as a .mp3 file. Vulnerabilidad de ruta de búsqueda no confiable en bin/winvlc.c de VLC Media Player v1.1.3 y anteriores permite a usuarios locales, y puede que atacantes remotos, ejecutar código de su elección y producir un ataque de secuestro de DLL, a través de un troyano wintab32.dll que está ubicado en la misma carpeta que un fichero .mp3. • https://www.exploit-db.com/exploits/14750 http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6 http://secunia.com/advisories/41107 http://www.exploit-db.com/exploits/14750 http://www.openwall.com/lists/oss-security/2010/08/25/10 http://www.openwall.com/lists/oss-security/2010/08/25/9 http://www.vupen.com/english/advis •

CVSS: 9.3EPSS: 15%CPEs: 2EXPL: 1

The MP4 demuxer (mp4.c) for VLC media player 0.8.6d and earlier, as used in Miro Player 1.1 and earlier, allows remote attackers to overwrite arbitrary memory and execute arbitrary code via a malformed MP4 file. El demultiplexor MP4 (mp4.c) para el reproductor multimedia VLC versión 0.8.6d y anterior, tal y como es usado en Miro Player versión 1.1 y anteriores, permite a los atacantes remotos sobrescribir la memoria arbitraria y ejecutar código arbitrario por medio de un archivo MP4 malformado. • https://www.exploit-db.com/exploits/5498 http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060481.html http://secunia.com/advisories/29122 http://secunia.com/advisories/29153 http://secunia.com/advisories/29284 http://secunia.com/advisories/29766 http://www.coresecurity.com/?action=item&id=2147 http://www.debian.org/security/2008/dsa-1543 http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml http://www.securityfocus.com/archive/1/488841/100/0/th • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 2

Heap-based buffer overflow in the libaccess_realrtsp plugin in VideoLAN VLC Media Player 0.8.6d and earlier on Windows might allow remote RTSP servers to cause a denial of service (application crash) or execute arbitrary code via a long string. Desbordamiento de búfer basado en montículo en el plugin libaccess_realrtsp de VideoLAN VLC Media Player 0.8.6d y versiones anteriores en Windows, podría permitir a servidores RTSP remotos provocar una denegación de servicio (caída de aplicación) ó ejecutar código de su elección mediante una cadena larga. • https://www.exploit-db.com/exploits/5498 http://aluigi.altervista.org/adv/vlcxhof-adv.txt http://secunia.com/advisories/29284 http://secunia.com/advisories/29766 http://www.debian.org/security/2008/dsa-1543 http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml http://www.vupen.com/english/advisories/2008/0105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14597 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •