Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xiph vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2018-18820
A buffer overflow exists in the URL-authentication backend of the Icecast prior to 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code e...
Xiph Icecast
Debian Debian Linux 9.0
Debian Debian Linux 8.0
445
VMScore
CVE-2014-9640
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (out-of-bounds read) via a crafted raw file.
Xiph Vorbis-tools 1.4.0
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
445
VMScore
CVE-2015-3026
Icecast prior to 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mo...
Xiph Icecast
Debian Debian Linux 8.0
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
445
VMScore
CVE-2014-9638
oggenc in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
Opensuse Opensuse 13.2
Fedoraproject Fedora 21
Opensuse Opensuse 13.1
Fedoraproject Fedora 20
Xiph Vorbis-tools 1.4.0
445
VMScore
CVE-2014-9639
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote malicious users to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
Xiph Vorbis-tools 1.4.0
Fedoraproject Fedora 20
Opensuse Opensuse 13.1
Fedoraproject Fedora 21
Opensuse Opensuse 13.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2