296,213
Total vulnerabilities in the database
Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.
Software | From | Fixed in |
---|---|---|
audacious_media_player_team / adplug | - | 2.0.x |