Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
live555 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-9215
In Live555 prior to 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
Live555 Streaming Media
Opensuse Backports Sle 15.0
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
1 Github repository
7.5
CVSSv3
CVE-2019-7732
In Live555 0.95, a setup packet can cause a memory leak leading to DoS because, when there are multiple instances of a single field (username, realm, nonce, uri, or response), only the last instance can ever be freed.
Live555 Streaming Media 0.95
7.5
CVSSv3
CVE-2019-7733
In Live555 0.95, there is a buffer overflow via a large integer in a Content-Length HTTP header because handleRequestBytes has an unrestricted memmove.
Live555 Streaming Media 0.95
9.8
CVSSv3
CVE-2019-7314
liblivemedia in Live555 prior to 2019.02.03 mishandles the termination of an RTSP stream after RTP/RTCP-over-RTSP has been set up, which could lead to a Use-After-Free error that causes the RTSP server to crash (Segmentation fault) or possibly have unspecified other impact.
Live555 Streaming Media
Debian Debian Linux 8.0
11 Github repositories
9.8
CVSSv3
CVE-2019-6256
A Denial of Service issue exists in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POS...
Live555 Live555 Media Server 0.93
Debian Debian Linux 8.0
Debian Debian Linux 9.0
9.8
CVSSv3
CVE-2018-4013
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger t...
Live555 Live555 Media Server 0.92
Debian Debian Linux 8.0
Debian Debian Linux 9.0
4 Github repositories
NA
CVE-2013-6934
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2013.11.26, as used in VideoLAN VLC Media Player, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a space character at the beginning of an RTSP ...
Live555 Streaming Media 2013-11-26
Videolan Vlc Media Player
NA
CVE-2013-6933
The parseRTSPRequestString function in Live Networks Live555 Streaming Media 2011.08.13 up to and including 2013.11.25, as used in VideoLAN VLC Media Player, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) space or ...
Live555 Streaming Media 2013-11-25
Live555 Streaming Media 2013-10-03
Live555 Streaming Media 2013-10-02
Live555 Streaming Media 2013-10-01
Live555 Streaming Media 2013-09-30
Live555 Streaming Media 2013-07-03
Live555 Streaming Media 2013-06-30
Live555 Streaming Media 2013-06-18
Live555 Streaming Media 2013-06-14
Live555 Streaming Media 2013-04-01
Live555 Streaming Media 2013-03-31
Live555 Streaming Media 2013-03-23
Live555 Streaming Media 2013-03-07
Live555 Streaming Media 2013-02-27
Live555 Streaming Media 2012-12-24
Live555 Streaming Media 2012-12-23
Live555 Streaming Media 2012-12-22
Live555 Streaming Media 2012-12-21
Live555 Streaming Media 2012-10-18
Live555 Streaming Media 2012-10-17
Live555 Streaming Media 2012-10-16
Live555 Streaming Media 2012-10-12
NA
CVE-2007-6036
The parseRTSPRequestString function in LIVE555 Media Server 2007.11.01 and previous versions allows remote malicious users to cause a denial of service (daemon crash) via a short RTSP query, which causes a negative number to be used during memory allocation.
Live555 Media Server
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2907
hardcoded
inject
CVE-2024-20359
CVE-2024-2467
CVE-2024-4077
CVE-2024-22391
camera
CVE-2024-20353
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2