Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
audacityteam vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2017-1000010
Audacity 2.1.2 up to and including 2.3.2 is vulnerable to Dll HIjacking in the avformat-55.dll resulting arbitrary code execution.
Audacityteam Audacity
1 Github repository
5.5
CVSSv3
CVE-2016-2540
Audacity prior to 2.1.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) via a crafted FORMATCHUNK structure.
Audacityteam Audacity
5.5
CVSSv3
CVE-2016-2541
Audacity prior to 2.1.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) via a crafted MP2 file.
Audacityteam Audacity
NA
CVE-2009-0490
Stack-based buffer overflow in the String_parse::get_nonspace_quoted function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other versions prior to 1.3.6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a .gro file...
Audacityteam Audacity
3 EDB exploits
NA
CVE-2007-6061
Audacity 1.3.2 creates a temporary directory with a predictable name without checking for previous existence of that directory, which allows local users to cause a denial of service (recording deadlock) by creating the directory before Audacity is run. NOTE: this issue can be lev...
Audacityteam Audacity 1.3.2
3.3
CVSSv3
CVE-2020-11867
Audacity up to and including 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.
Audacityteam Audacity
Fedoraproject Fedora 33
Fedoraproject Fedora 34
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started