Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lame project lame 3.98.2 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2017-15046
LAME 3.99.5, 3.99.4, 3.98.4, 3.98.2, 3.98 and 3.97 have a stack-based buffer overflow in unpack_read_samples in frontend/get_audio.c, a different vulnerability than CVE-2017-9412.
Lame Project Lame 3.97
Lame Project Lame 3.98
Lame Project Lame 3.98.2
Lame Project Lame 3.98.4
Lame Project Lame 3.99.4
Lame Project Lame 3.99.5
383
VMScore
CVE-2017-15018
LAME 3.99.5, 3.99.4, 3.99.3, 3.99.2, 3.99.1, 3.99, 3.98.4, 3.98.2 and 3.98 have a heap-based buffer over-read when handling a malformed file in k_34_4 in vbrquantize.c.
Lame Project Lame 3.98
Lame Project Lame 3.98.2
Lame Project Lame 3.98.4
Lame Project Lame 3.99
Lame Project Lame 3.99.1
Lame Project Lame 3.99.2
Lame Project Lame 3.99.3
Lame Project Lame 3.99.4
Lame Project Lame 3.99.5
383
VMScore
CVE-2015-9101
The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.98.4, 3.98.2, 3.98, 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4 and 3.99.5 allows remote malicious users to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
Lame Project Lame 3.98
Lame Project Lame 3.98.2
Lame Project Lame 3.98.4
Lame Project Lame 3.99
Lame Project Lame 3.99.1
Lame Project Lame 3.99.2
Lame Project Lame 3.99.3
Lame Project Lame 3.99.4
Lame Project Lame 3.99.5
383
VMScore
CVE-2017-15045
LAME 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4, 3.99.5, 3.98.4, 3.98.2 and 3.98 has a heap-based buffer over-read in fill_buffer in libmp3lame/util.c, related to lame_encode_buffer_sample_t in libmp3lame/lame.c, a different vulnerability than CVE-2017-9410.
Lame Project Lame 3.99.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started