Page 5 of 26 results (0.005 seconds)

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Stack-based buffer overflow in the asf_mmst_streaming.c functionality for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a large MMST stream packet. • http://www.idefense.com/application/poi/display?id=167 http://www.mandriva.com/security/advisories?name=MDKSA-2004:157 http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog https://exchange.xforce.ibmcloud.com/vulnerabilities/18526 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Integer overflow in the real_setup_and_get_header function in real.c for Unix MPlayer 1.0pre5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a Real RTSP streaming media file with a -1 content-length field, which leads to a heap-based buffer overflow. • http://www.idefense.com/application/poi/display?id=166 http://www.mandriva.com/security/advisories?name=MDKSA-2004:157 http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog https://exchange.xforce.ibmcloud.com/vulnerabilities/18525 •

CVSS: 10.0EPSS: 10%CPEs: 14EXPL: 1

Buffer overflow in TranslateFilename for common.c in MPlayer 1.0pre4 allows remote attackers to execute arbitrary code via a long file name. • https://www.exploit-db.com/exploits/308 http://marc.info/?l=bugtraq&m=108844316930791&w=2 http://www.gentoo.org/security/en/glsa/glsa-200408-01.xml http://www.securityfocus.com/bid/10615 https://exchange.xforce.ibmcloud.com/vulnerabilities/16532 •

CVSS: 10.0EPSS: 8%CPEs: 16EXPL: 0

Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets. Múltiples desbordamientos de búfer en cliente Real-Time Streaming Protocol (RTSP) de (1) MPlayer anteriores a 1.0pre4 y (2) xine lib (xine-lib) anteriores a 1-rc4, cuando reproduce secuencias Real trsp (realrtsp), que permiten a atacantes remotos causar una denegación de servivio (caída) y posiblemente ejecutar código de su eleccion mediante (a) URLs largas, (b) respuestas de servidor Real largas, o (c) paquetes de transporte de datos Real (RDT) largos. • http://security.gentoo.org/glsa/glsa-200405-24.xml http://www.xinehq.de/index.php/security/XSA-2004-3 https://exchange.xforce.ibmcloud.com/vulnerabilities/16019 •

CVSS: 10.0EPSS: 28%CPEs: 17EXPL: 2

Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and earlier, 0.90, and 0.91 allows remote attackers to execute arbitrary code via a long Location header. Desbordamiento de búfer en el procesador HTTP de MPlayer 1.0pre3 y anteriores, 0.90 y 0.91 permite a atacantes ejecutar código arbitrario mediante una cabecera Location larga. • https://www.exploit-db.com/exploits/23896 http://marc.info/?l=bugtraq&m=108067020624076&w=2 http://secunia.com/advisories/11259 http://security.gentoo.org/glsa/glsa-200403-13.xml http://www.kb.cert.org/vuls/id/723910 http://www.mandriva.com/security/advisories?name=MDKSA-2004:026 http://www.mplayerhq.hu/homepage/design6/news.html http://www.securityfocus.com/archive/1/359025 http://www.securityfocus.com/bid/10008 https://exchange.xforce.ibmcloud.com/vulnerabilities/1567 •