Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xiph vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2018-18820
A buffer overflow exists in the URL-authentication backend of the Icecast prior to 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code e...
Xiph Icecast
Debian Debian Linux 8.0
Debian Debian Linux 9.0
NA
CVE-2014-9640
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (out-of-bounds read) via a crafted raw file.
Xiph Vorbis-tools 1.4.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
NA
CVE-2015-3026
Icecast prior to 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mo...
Xiph Icecast
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
NA
CVE-2014-9638
oggenc in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Xiph Vorbis-tools 1.4.0
NA
CVE-2014-9639
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
Xiph Vorbis-tools 1.4.0
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2