what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

VLC 2.0.2 Division By Zero
Posted Aug 2, 2012
Authored by Dark-Puzzle

VLC version 2.0.2 suffers form a division by zero vulnerability when parsing .3gp files.

tags | exploit
SHA-256 | da55a94e432e51e736b1d6f0ce42d24343527d51712743f54b3519ce8df13c19

Related Files

Secunia Security Advisory 49835
Posted Jul 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 826805e88738f80b5814689653860c9ae700a8441eaa01a55954633a371572bb
VLC 2.0.1 Denial Of Service
Posted Jun 28, 2012
Authored by Dark-Puzzle

VLC version 2.0.1 suffers from an avi playlist denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 6400dd1a7d12ff853c19c53043a4fdc93b5051de204e01bf898e62de9dd1b0da
VLC MMS Stream Handling Buffer Overflow
Posted May 3, 2012
Authored by sinn3r, juan vazquez, Florent Hochwelker | Site metasploit.com

This Metasploit module exploits a buffer overflow in VLC media player VLC media player prior to 2.0.0. The vulnerability is due to a dangerous use of sprintf which can result in a stack buffer overflow when handling a malicious MMS URI. This Metasploit module uses the browser as attack vector. A specially crafted MMS URI is used to trigger the overflow and get flow control through SEH overwrite. Control is transferred to code located in the heap through a standard heap spray. The module only targets IE6 and IE7 because no DEP/ASLR bypass has been provided.

tags | exploit, overflow
advisories | CVE-2012-1775, OSVDB-80188
SHA-256 | 7856c6264ba9fc35e320d076f363c777f1720c644ed1819cf46c0dd75d155ea8
VLC 2.0.1 Division By Zero
Posted Apr 19, 2012
Authored by Senator of Pirates

VLC version 2.0.1 suffers from a division by zero vulnerability during the handling of mp4 files.

tags | exploit, denial of service
SHA-256 | 10f07cc24725bca656acafb4767470f9903dd176fb798703ffd1e1ed72195799
Secunia Security Advisory 48503
Posted Mar 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 1344d931b33df5b015c5d13a06878d9760e33c10dc320f742d730dfb5365148f
Secunia Security Advisory 48500
Posted Mar 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | d7c5a4b1cfbb1455ae006f126e1a88d87147b0812c3241bd9d9a4ca0ce6aa61e
VLC Media Player 1.1.11 Denial Of Service
Posted Mar 13, 2012
Authored by Senator of Pirates

VLC Media Player versions 1.1.11 and below denial of service exploit that makes a malicious .flv file.

tags | exploit, denial of service
SHA-256 | 0eca42f600feb65e6a323e108ff5b1100d57ba6652c470f72002fe4d1c68fa73
VLC Media Player RealText Subtitle Overflow
Posted Mar 3, 2012
Authored by Tobias Klein, SkD, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in VideoLAN VLC versions prior to 0.9.6. The vulnerability exists in the parsing of RealText subtitle files. In order to exploit this, this module will generate two files: The .mp4 file is used to trick your victim into running. The .rt file is the actual malicious file that triggers the vulnerability, which should be placed under the same directory as the .mp4 file.

tags | exploit, overflow
advisories | CVE-2008-5036, OSVDB-49809
SHA-256 | 9952cf454696629976235ec8de966c57016db79252896be88870fdf2312f2133
VLC 1.2.0 Divide By Zero Denial of Service
Posted Jan 20, 2012
Authored by nomnom

VLC versions 1.2.0 and 1.1.11 divide by zero denial of service exploit that creates a malicious .ape file.

tags | exploit, denial of service
SHA-256 | 1fc02c07be4fb6c8bec8cc2ea9f95b4f25bbd2a8c2df3caa1f313b10455793fe
VLC Media Player 1.1.11 Proof Of Concept
Posted Jan 4, 2012
Authored by Fabi

VLC Media Player version 1.1.11 local crash proof of concept exploit that creates a malicious .amr file.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 3654b16d4f40690e87c6db730f6a6a8e8d68a8e12ea1c3ac542e32750b0de54a
Secunia Security Advisory 47325
Posted Dec 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VLC Media Player, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3883b5b4df526065c87fa832186337b859739de4bab03919334bcb9ea5e1340e
libdvdcss 1.2.11
Posted Nov 16, 2011
Site videolan.org

libdvdcss is a cross-platform library for transparent DVD device access with on-the-fly CSS decryption. It currently runs under Linux, FreeBSD, NetBSD, OpenBSD, BSD/OS, Solaris, BeOS, Win95/Win98, Win2k/WinXP, MacOS X, HP-UX, QNX, and OS/2. It is used by libdvdread and most DVD players such as VLC because of its portability and because, unlike similar libraries, it does not require your DVD drive to be region locked.

Changes: This release improves RPC-II drive handling and contains a more robust keys retrieval mode. It also introduces fixes for MingW and OS/2 compilation, and has various bugfixes for small issues, memory leaks, crashes, and build issues.
tags | library
systems | linux, netbsd, windows, unix, solaris, freebsd, bsd, openbsd, hpux, beos, osx
SHA-256 | 4f2578b995a25f1d81ae2b3c6e4cc5b0a199581d4a0b3a2d67c48c3ed5db9199
Secunia Security Advisory 46224
Posted Oct 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VLC Media Player, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 098c962cf99d7603ddc0e167287b7e3a554fd4f6b5a3ed99fcd220743e7670cc
LibAVCodec AMV Out Of Array Write
Posted Aug 1, 2011
Authored by Dominic Chell | Site ngssecure.com

Dominic Chell of NGS Secure has discovered a high risk vulnerability in LibAVCodec. Opening a malformed AMV file can result in an out of array write and potentially arbitrary code execution when using this library. Whilst the vulnerability may affect multiple applications that use this library, it was only tested on VLC media player. VLC media player versions 1.1.9 and below are affected.

tags | advisory, arbitrary, code execution
advisories | CVE-2011-1931
SHA-256 | 185b2a8f4df8fd3182b6a8b7c17b80825f8ca66454647c947edaad4f084253e6
Secunia Security Advisory 45066
Posted Jul 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hossein Lotfi has discovered two vulnerabilities in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 4b30d905dfb4dcccb16720777e103f953971c769ee29ddfacb6e029130bf72c6
Secunia Security Advisory 44892
Posted Jun 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | d2a48b656597dc5ca5ad5cfb6748bcb2255e19f3dbf279df0f6cfd76bfb0eb36
Debian Security Advisory 2257-1
Posted Jun 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2257-1 - Rocco Calvi discovered that the XSPF playlist parser of vlc, a multimedia player and streamer, is prone to an integer overflow resulting in a heap-based buffer overflow. This might allow an attacker to execute arbitrary code by tricking a victim into opening a specially crafted file.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-2194
SHA-256 | a64bbf0519ed68e16024a87f3bd0db4a3a66ade3a1196b2a76b6270b0ed4b867
VLC Media Player XSPF Local File Integer Overflow
Posted Jun 9, 2011
Authored by TecR0c

VLC Media Player suffers from an XSPF local file integer overflow in the XSPF playlist parser. Versions 1.1.9 down to 0.8.5 are affected.

tags | exploit, overflow, local
SHA-256 | 327fb012113f085e2d29934a59a41059f4a43c75746929006f19c0dcd0cdb1b8
VideoLAN VLC ModPlug ReadS3M Stack Buffer Overflow
Posted May 9, 2011
Authored by jduck | Site metasploit.com

This Metasploit module exploits an input validation error in libmod_plugin as included with VideoLAN VLC 1.1.8. All versions prior to version 1.1.9 are affected. By creating a malicious S3M file, a remote attacker could execute arbitrary code. Although other products that bundle libmodplug may be vulnerable, this module was only tested against VLC. NOTE: As of July 1st, 2010, VLC now calls SetProcessDEPPoly to permanently enable NX support on machines that support it. As such, this module is capable of bypassing DEP, but not ASLR.

tags | exploit, remote, arbitrary
advisories | CVE-2011-1574, OSVDB-72143
SHA-256 | e72918bb99176c250a3e97631e70871f2208d1f45b7278b1b4936f047fb968a6
Secunia Security Advisory 44412
Posted May 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 6e3802fd5e2d74f07b340787cb4615cbf5a2e4a003650add4387c6ecf36082e1
LibAVCodec AMV Out Of Array Write
Posted Apr 27, 2011
Authored by Dominic Chell | Site ngssoftware.com

Dominic Chell of NGS Secure has discovered a high risk vulnerability in LibAVCodec. Opening a malformed AMV file can result in an out of array write and potentially arbitrary code execution when using this library. Whilst the vulnerability may affect multiple applications that use this library, it was only tested on VLC media player. VLC media player versions 1.1.9 and below are affected.

tags | advisory, arbitrary, code execution
SHA-256 | 17c0e508710bb4f00f1f179e385b3d378527bd4b35827d30da710e418db26947
Secunia Security Advisory 43890
Posted Apr 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 7e9dde60037fffb9416269b06f324a25795f7041506c7119241e5693418a939c
Debian Security Advisory 2218-1
Posted Apr 12, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2218-1 - Aliz Hammond discovered that the MP4 decoder plugin of vlc, a multimedia player and streamer, is vulnerable to a heap-based buffer overflow. This has been introduced by a wrong data type being used for a size calculation. An attacker could use this flaw to trick a victim into opening a specially crafted MP4 file and possibly execute arbitrary code or crash the media player.

tags | advisory, overflow, arbitrary
systems | linux, debian
SHA-256 | c8adbc06f6e2fd87eb7ffec3f0699e8fd5b855245664ee31d7e93046210c0e47
Secunia Security Advisory 44022
Posted Apr 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VLC Media Player, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 8bbe504ccd2036d8c9b7d86f7b10e956eb766e3d18c31a32842bc253ef801971
Secunia Security Advisory 44064
Posted Apr 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2a4a63d1ab9b61462dc05cb8908430aef73dbf6ad0fb0d62d6bb2a995b686e01
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close