Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w9vw-r38j-pm48

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.

Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.

EPSS

Процентиль: 97%
0.30642
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 17 лет назад

Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.

nvd
около 17 лет назад

Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.

debian
около 17 лет назад

Stack-based buffer overflow in the demux_open_vqf function in libmpdem ...

EPSS

Процентиль: 97%
0.30642
Средний

Дефекты

CWE-119