1 2 3 4 5 6 7 8 9 10 |
source: https://www.securityfocus.com/bid/38566/info J. River Media Jukebox is prone to a remote heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Media Jukebox 12 is vulnerable; other versions may also be affected. <audio class="wp-audio-shortcode" id="audio-89540-2" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3?_=2" /><a href="https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3">https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3</a></audio> |