Количество 4
Количество 4
CVE-2014-125015
A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
CVE-2014-125015
A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
CVE-2014-125015
A vulnerability classified as critical has been found in FFmpeg 2.0. A ...
GHSA-jwc2-6wxh-qmvw
A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2014-125015 A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. | CVSS3: 7.3 | 0% Низкий | больше 3 лет назад | |
CVE-2014-125015 A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. | CVSS3: 7.3 | 0% Низкий | больше 3 лет назад | |
CVE-2014-125015 A vulnerability classified as critical has been found in FFmpeg 2.0. A ... | CVSS3: 7.3 | 0% Низкий | больше 3 лет назад | |
GHSA-jwc2-6wxh-qmvw A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу