Page 6 of 30 results (0.015 seconds)

CVSS: 6.8EPSS: 1%CPEs: 60EXPL: 1

VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption. VLC versions anteriores a la 0.8.6f, permite a atacantes remotos provocar una denegación de servicio (caída) a través de un Cinepak manipulado que dispara un acceso a array fuera de límite y una corrupción de memoria. • https://www.exploit-db.com/exploits/5498 http://bugs.gentoo.org/show_bug.cgi?id=214627#c3 http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98 http://secunia.com/advisories/29503 http://secunia.com/advisories/29800 http://security.gentoo.org/glsa/glsa-200804-25.xml http://wiki.videolan.org/Changelog/0.8.6f http://www.securityfocus.com/bid/28904 http://www.videolan.org/developers/vlc/NEWS http://www.videolan.org/security/sa0803. • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 30%CPEs: 1EXPL: 2

Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file. Desbordamiento de búfer basado en pila en modules/demux/subtitle.c de VideoLAN VLC 0.8.6d permite a atacantes remotos ejecutar código de su elección mediante un subtítulo largo en un fichero (1) MicroDvd, (2) SSA, y (3) Vplayer. • https://www.exploit-db.com/exploits/5498 http://aluigi.altervista.org/adv/vlcboffs-adv.txt http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html http://osvdb.org/42207 http://secunia.com/advisories/28233 http://secunia.com/advisories/29284 http://secunia.com/advisories/29766 http://secunia.com/advisories/29800 http://security.gentoo.org/glsa/glsa-200804-25.xml http://securityreason.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 71%CPEs: 1EXPL: 2

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter. Vulnerabilidad de cadena de formato en la función httpd_FileCallBack (network/httpd.c) de VideoLAN VLC 0.8.6d permite a atacantes remotos ejecutar código de su elección mediante especificadores de cadenas de formato en el parámetro Connection. • https://www.exploit-db.com/exploits/5519 http://aluigi.altervista.org/adv/vlcboffs-adv.txt http://osvdb.org/42208 http://secunia.com/advisories/28233 http://secunia.com/advisories/29284 http://secunia.com/advisories/29766 http://securityreason.com/securityalert/3550 http://trac.videolan.org/vlc/changeset/23839 http://www.debian.org/security/2008/dsa-1543 http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml http://www.securityfocus.com/archive/1/485488/30/0/ •

CVSS: 6.8EPSS: 32%CPEs: 3EXPL: 2

A certain ActiveX control in axvlc.dll in VideoLAN VLC 0.8.6 before 0.8.6d allows remote attackers to execute arbitrary code via crafted arguments to the (1) addTarget, (2) getVariable, or (3) setVariable function, resulting from a "bad initialized pointer," aka a "recursive plugin release vulnerability." Cierto control ActiveX de axvlc.dll en VideoLAN VLC 0.8.6 anterior a 0.8.6d permite a atacantes remotos ejecutar código de su elección mediante argumentos manipulados a las funciones (1) addTarget, (2) getVariable, o (3) setVariable, resultando en un "puntero mal inicializado", también conocido como una "vulnerabilidad recursiva de liberación de extensión". • https://www.exploit-db.com/exploits/4688 http://secunia.com/advisories/27878 http://securityreason.com/securityalert/3420 http://www.coresecurity.com/?action=item&id=2035 http://www.securityfocus.com/archive/1/484563/100/0/threaded http://www.securityfocus.com/bid/26675 http://www.videolan.org/sa0703.html http://www.vupen.com/english/advisories/2007/4061 https://exchange.xforce.ibmcloud.com/vulnerabilities/38816 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mi • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 95%CPEs: 10EXPL: 3

Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file. Múltiples vulnerabilidades de cadena de formato en (1) la función cdio_log_handler en el archivo modules/access/cdda/access.c en el plugin CDDA (libcdda_plugin) y las funciones (2) cdio_log_handler y (3) vcd_log_handler en el archivo modules/access/vcdx/access.c en el plugin VCDX (libvcdx_plugin), en VideoLAN VLC versiones 0.7.0 hasta 0.8.6, permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de especificadores de cadena de formato en un URI no válido, como es demostrado por un URI udp://-- en un archivo M3U. • https://www.exploit-db.com/exploits/3069 https://www.exploit-db.com/exploits/3070 http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html http://landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html http://osvdb.org/31163 http://projects.info-pull.com/moab/MOAB-02-01-2007.html http://secunia.com/advisories/23592 http://secunia.com/advisories/23829 http://secunia.com/advisories/23910 http://secunia.com/advisories/23971 htt • CWE-134: Use of Externally-Controlled Format String •