Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qfw4-wpcc-9fg4

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the MplayInputFile function in Serenity Audio Player 3.2.3 and earlier allows remote attackers to execute arbitrary code via a long URL in an M3U file. NOTE: some of these details are obtained from third party information.

Stack-based buffer overflow in the MplayInputFile function in Serenity Audio Player 3.2.3 and earlier allows remote attackers to execute arbitrary code via a long URL in an M3U file. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 92%
0.07999
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
около 16 лет назад

Stack-based buffer overflow in the MplayInputFile function in Serenity Audio Player 3.2.3 and earlier allows remote attackers to execute arbitrary code via a long URL in an M3U file. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 92%
0.07999
Низкий

Дефекты

CWE-119