Логотип exploitDog
bind:CVE-2006-3582
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-3582

Количество 4

Количество 4

ubuntu логотип

CVE-2006-3582

около 19 лет назад

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.

CVSS2: 5.1
EPSS: Низкий
nvd логотип

CVE-2006-3582

около 19 лет назад

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.

CVSS2: 5.1
EPSS: Низкий
debian логотип

CVE-2006-3582

около 19 лет назад

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earli ...

CVSS2: 5.1
EPSS: Низкий
github логотип

GHSA-64hh-6gf5-7fg8

больше 3 лет назад

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-3582

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.

CVSS2: 5.1
9%
Низкий
около 19 лет назад
nvd логотип
CVE-2006-3582

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.

CVSS2: 5.1
9%
Низкий
около 19 лет назад
debian логотип
CVE-2006-3582

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earli ...

CVSS2: 5.1
9%
Низкий
около 19 лет назад
github логотип
GHSA-64hh-6gf5-7fg8

Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.

9%
Низкий
больше 3 лет назад

Уязвимостей на страницу