Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
matroska libebml vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2015-8789
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML prior to 1.3.3 allows context-dependent malicious users to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document...
Matroska Libebml
383
VMScore
CVE-2015-8790
The EbmlUnicodeString::UpdateFromUTF8 function in libEBML prior to 1.3.3 allows context-dependent malicious users to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.
Matroska Libebml
383
VMScore
CVE-2015-8791
The EbmlElement::ReadCodedSizeValue function in libEBML prior to 1.3.3 allows context-dependent malicious users to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
Matroska Libebml
NA
CVE-2023-52339
In libebml prior to 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
Matroska Libebml
383
VMScore
CVE-2021-3405
A flaw was found in libebml prior to 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.
Matroska Libebml
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started