Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
audio module vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0964
Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.
Zinf Zinf 2.2.1
Debian Debian Linux 3.0
6 EDB exploits
9.3
CVSSv2
CVE-2021-44228
Apache Log4j2 2.0-beta9 up to and including 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can contr...
Apache Log4j 2.0
Apache Log4j
Siemens Sppa-t3000 Ses3000 Firmware
Siemens Logo\\! Soft Comfort
Siemens Spectrum Power 4 4.70
Siemens Spectrum Power 4
Siemens Siveillance Control Pro
Siemens Energyip Prepay 3.7
Siemens Energyip Prepay 3.8
Siemens Siveillance Identity 1.6
Siemens Siveillance Identity 1.5
Siemens Siveillance Command
Siemens Sipass Integrated 2.85
Siemens Sipass Integrated 2.80
Siemens Head-end System Universal Device Integration System
Siemens Gma-manager
Siemens Energyip 8.5
Siemens Energyip 8.6
Siemens Energyip 8.7
Siemens Energyip 9.0
Siemens Energy Engage 3.1
Siemens E-car Operation Center
2 Metasploit modules
1181 Github repositories
28 Articles
9.3
CVSSv2
CVE-2020-27909
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution.
Apple Tvos
Apple Iphone Os
Apple Watchos
Apple Ipados
Apple Macos
9.3
CVSSv2
CVE-2010-0480
Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote malicious users to execute arbitrary code via a crafted AVI file, aka "M...
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
Microsoft Windows 2003 Server
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Vista -
3 EDB exploits
1 Article
8.3
CVSSv2
CVE-2017-0781
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
Google Android 7.1.0
Google Android 7.1.1
Google Android 5.1.0
Google Android 5.1.1
Google Android 4.1.2
Google Android 4.2
Google Android 4.4.2
Google Android 4.4.3
Google Android 4.4.4
Google Android 8.0
Google Android 7.0
Google Android 5.0.2
Google Android 5.1
Google Android 4.0.4
Google Android 4.1
Google Android 4.4
Google Android 4.4.1
Google Android 5.0
Google Android 5.0.1
Google Android 4.0.2
Google Android 4.0.3
Google Android 4.3
1 EDB exploit
20 Github repositories
8.3
CVSSv2
CVE-2017-0782
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146237.
Google Android 8.0
Google Android 7.0
Google Android 5.0.1
Google Android 5.0.2
Google Android 4.0.4
Google Android 4.1
Google Android 4.4
Google Android 4.4.1
Google Android 6.0.1
Google Android 5.0
Google Android 4.0.2
Google Android 4.0.3
Google Android 4.3
Google Android 4.3.1
Google Android 7.1.2
Google Android 6.0
Google Android 5.1.1
Google Android 4.0
Google Android 4.0.1
Google Android 4.2.1
Google Android 4.2.2
Google Android 4.4.4
4 Github repositories
8.3
CVSSv2
CVE-2011-3191
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel prior to 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read reque...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
8.3
CVSSv2
CVE-2011-2497
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel prior to 3.0 allows remote malicious users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within th...
Linux Linux Kernel
7.9
CVSSv2
CVE-2017-14315
In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly v...
Apple Iphone Os 7.0
Apple Iphone Os 7.0.1
Apple Iphone Os 7.0.2
Apple Iphone Os 7.1.2
Apple Iphone Os 8.0
Apple Iphone Os 8.4.1
Apple Iphone Os 9.0
Apple Iphone Os 9.3.2
Apple Iphone Os 9.3.3
Apple Iphone Os 7.0.3
Apple Iphone Os 7.0.4
Apple Iphone Os 8.0.1
Apple Iphone Os 8.0.2
Apple Iphone Os 9.0.1
Apple Iphone Os 9.0.2
Apple Iphone Os 9.3.4
Apple Iphone Os 9.3.5
Apple Iphone Os 7.0.5
Apple Iphone Os 7.0.6
Apple Iphone Os 8.1
Apple Iphone Os 8.1.2
Apple Iphone Os 9.1
7.5
CVSSv2
CVE-2021-46786
The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
Huawei Harmonyos 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »