Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7w7-cpg3-7c4q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple heap-based buffer overflows in the code used to handle (1) MMS over TCP (MMST) streams or (2) RealMedia RTSP streams in xine-lib before 1.0, and other products that use xine-lib such as MPlayer 1.0pre6 and earlier, allow remote malicious servers to execute arbitrary code.

Multiple heap-based buffer overflows in the code used to handle (1) MMS over TCP (MMST) streams or (2) RealMedia RTSP streams in xine-lib before 1.0, and other products that use xine-lib such as MPlayer 1.0pre6 and earlier, allow remote malicious servers to execute arbitrary code.

EPSS

Процентиль: 82%
0.01744
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Multiple heap-based buffer overflows in the code used to handle (1) MMS over TCP (MMST) streams or (2) RealMedia RTSP streams in xine-lib before 1.0, and other products that use xine-lib such as MPlayer 1.0pre6 and earlier, allow remote malicious servers to execute arbitrary code.

nvd
больше 20 лет назад

Multiple heap-based buffer overflows in the code used to handle (1) MMS over TCP (MMST) streams or (2) RealMedia RTSP streams in xine-lib before 1.0, and other products that use xine-lib such as MPlayer 1.0pre6 and earlier, allow remote malicious servers to execute arbitrary code.

debian
больше 20 лет назад

Multiple heap-based buffer overflows in the code used to handle (1) MM ...

EPSS

Процентиль: 82%
0.01744
Низкий