Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
audacityteam audacity vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2017-1000010
Audacity 2.1.2 up to and including 2.3.2 is vulnerable to Dll HIjacking in the avformat-55.dll resulting arbitrary code execution.
Audacityteam Audacity
1 Github repository
383
VMScore
CVE-2016-2540
Audacity prior to 2.1.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) via a crafted FORMATCHUNK structure.
Audacityteam Audacity
945
VMScore
CVE-2009-0490
Stack-based buffer overflow in the String_parse::get_nonspace_quoted function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other versions prior to 1.3.6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a .gro file...
Audacityteam Audacity
3 EDB exploits
383
VMScore
CVE-2016-2541
Audacity prior to 2.1.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) via a crafted MP2 file.
Audacityteam Audacity
450
VMScore
CVE-2007-6061
Audacity 1.3.2 creates a temporary directory with a predictable name without checking for previous existence of that directory, which allows local users to cause a denial of service (recording deadlock) by creating the directory before Audacity is run. NOTE: this issue can be lev...
Audacityteam Audacity 1.3.2
187
VMScore
CVE-2020-11867
Audacity up to and including 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.
Audacityteam Audacity
Fedoraproject Fedora 33
Fedoraproject Fedora 34
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started