Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
audacityteam audacity vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2016-2540
Audacity prior to 2.1.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) via a crafted FORMATCHUNK structure.
Audacityteam Audacity
383
VMScore
CVE-2016-2541
Audacity prior to 2.1.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) via a crafted MP2 file.
Audacityteam Audacity
605
VMScore
CVE-2017-1000010
Audacity 2.1.2 up to and including 2.3.2 is vulnerable to Dll HIjacking in the avformat-55.dll resulting arbitrary code execution.
Audacityteam Audacity
1 Github repository
945
VMScore
CVE-2009-0490
Stack-based buffer overflow in the String_parse::get_nonspace_quoted function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other versions prior to 1.3.6 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a .gro file...
Audacityteam Audacity
3 EDB exploits
450
VMScore
CVE-2007-6061
Audacity 1.3.2 creates a temporary directory with a predictable name without checking for previous existence of that directory, which allows local users to cause a denial of service (recording deadlock) by creating the directory before Audacity is run. NOTE: this issue can be lev...
Audacityteam Audacity 1.3.2
187
VMScore
CVE-2020-11867
Audacity up to and including 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.
Audacityteam Audacity
Fedoraproject Fedora 33
Fedoraproject Fedora 34
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started