Page 14 of 70 results (0.010 seconds)

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 0

Integer overflow in the __status_Update function in stats.c VideoLAN VLC Media Player before 0.8.6c allows remote attackers to cause a denial of service (crash) via a WAV file with a large sample rate. Desbordamiento de entero en la función the __status_Update en stats.c de VideoLAN VLC Media Player anterior a 0.8.6c permite a atacantes remotos provocar una denegación de servicio (caída) mediante un fichero WAV con una tasa de muestreo grande. • http://osvdb.org/42189 http://secunia.com/advisories/25980 http://www.debian.org/security/2007/dsa-1332 http://www.isecpartners.com/advisories/2007-001-vlc.txt http://www.securityfocus.com/archive/1/471933/100/0/threaded https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14863 •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 0

input.c in VideoLAN VLC Media Player before 0.8.6c allows remote attackers to cause a denial of service (crash) via a crafted WAV file that causes an uninitialized i_nb_resamplers variable to be used. input.c en VideoLAN VLC Media Player anterior a 0.8.6c permite a atacantes remotos provocar una denegación de servicio (caída) mediante un fichero WAV artesanal que provoca que una variable i_nb_resamplers no inicializada sea usada. • http://osvdb.org/38992 http://secunia.com/advisories/25980 http://www.debian.org/security/2007/dsa-1332 http://www.isecpartners.com/advisories/2007-001-vlc.txt http://www.securityfocus.com/archive/1/471933/100/0/threaded https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744 •

CVSS: 9.3EPSS: 82%CPEs: 2EXPL: 0

Multiple format string vulnerabilities in plugins in VideoLAN VLC Media Player before 0.8.6c allow remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in (1) an Ogg/Vorbis file, (2) an Ogg/Theora file, (3) a CDDB entry for a CD Digital Audio (CDDA) file, or (4) Service Announce Protocol (SAP) multicast packets. Múltiples vulnerabilidades de formato de cadena en las extensiones del VideoLAN VLC Media Player anterior al 0.8.6c permiten a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección a través de especificadores de formato de cadena en el fichero (1) Ogg/Vorbis, (2) Ogg/Theora (3) la entrada CDDB para un fichero CD Digital Audio (CDDA) o (4) paquetes de envío múltiple (multicast) Service Announce Protocol (SAP). • http://osvdb.org/37379 http://osvdb.org/37380 http://osvdb.org/37381 http://osvdb.org/37382 http://secunia.com/advisories/25753 http://secunia.com/advisories/25980 http://secunia.com/advisories/26269 http://security.gentoo.org/glsa/glsa-200707-12.xml http://www.debian.org/security/2007/dsa-1332 http://www.isecpartners.com/advisories/2007-001-vlc.txt http://www.kb.cert.org/vuls/id/200928 http://www.securityfocus.com/archive/1/471933/100/0/threaded htt •

CVSS: 7.8EPSS: 9%CPEs: 1EXPL: 3

VideoLAN VLC 0.8.6a allows remote attackers to cause a denial of service (application crash) via a crafted .wmv file. VideoLAN VLC 0.8.6a permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) mediante un fichero .wmv manipulado. • https://www.exploit-db.com/exploits/3119 https://www.exploit-db.com/exploits/29443 http://downloads.securityfocus.com/vulnerabilities/exploits/22003.py http://osvdb.org/39022 http://wiki.videolan.org/Changelog/0.8.6b http://www.securityfocus.com/bid/22003 https://exchange.xforce.ibmcloud.com/vulnerabilities/31515 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14698 •

CVSS: 6.8EPSS: 95%CPEs: 10EXPL: 3

Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file. Múltiples vulnerabilidades de cadena de formato en (1) la función cdio_log_handler en el archivo modules/access/cdda/access.c en el plugin CDDA (libcdda_plugin) y las funciones (2) cdio_log_handler y (3) vcd_log_handler en el archivo modules/access/vcdx/access.c en el plugin VCDX (libvcdx_plugin), en VideoLAN VLC versiones 0.7.0 hasta 0.8.6, permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de especificadores de cadena de formato en un URI no válido, como es demostrado por un URI udp://-- en un archivo M3U. • https://www.exploit-db.com/exploits/3069 https://www.exploit-db.com/exploits/3070 http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html http://landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html http://osvdb.org/31163 http://projects.info-pull.com/moab/MOAB-02-01-2007.html http://secunia.com/advisories/23592 http://secunia.com/advisories/23829 http://secunia.com/advisories/23910 http://secunia.com/advisories/23971 htt • CWE-134: Use of Externally-Controlled Format String •