Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mjhf-5jqj-rmgj

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer signedness error in DivX Web Player 1.4.2.7, and possibly earlier versions, allows remote attackers to execute arbitrary code via a DivX file containing a crafted Stream Format (STRF) chunk, which triggers a heap-based buffer overflow.

Integer signedness error in DivX Web Player 1.4.2.7, and possibly earlier versions, allows remote attackers to execute arbitrary code via a DivX file containing a crafted Stream Format (STRF) chunk, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 90%
0.05926
Низкий

Связанные уязвимости

nvd
почти 17 лет назад

Integer signedness error in DivX Web Player 1.4.2.7, and possibly earlier versions, allows remote attackers to execute arbitrary code via a DivX file containing a crafted Stream Format (STRF) chunk, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 90%
0.05926
Низкий