Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v55q-pg6c-cwvp

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.

Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.

EPSS

Процентиль: 91%
0.06625
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.

EPSS

Процентиль: 91%
0.06625
Низкий