Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2012-0270
Disclosure Date: February 17, 2014 (last updated October 05, 2023)
Multiple stack-based buffer overflows in Csound before 5.16.6 allow remote attackers to execute arbitrary code via a crafted (1) hetro file to the getnum function in util/heti_main.c or (2) PVOC file to the getnum function in util/pv_import.c.
0
Attacker Value
Unknown
CVE-2012-2108
Disclosure Date: February 04, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the main function in util/lpci_main.c in Csound before 5.17.2, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted file.
0
Attacker Value
Unknown
CVE-2012-2107
Disclosure Date: February 04, 2014 (last updated October 05, 2023)
Integer overflow in the main function in util/lpci_main.c in Csound before 5.17.2, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2012-2106
Disclosure Date: February 04, 2014 (last updated October 05, 2023)
Integer overflow in the pv_import function in util/pv_import.c in Csound 5.16.6, when converting a file, allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2008-5986
Disclosure Date: January 28, 2009 (last updated October 04, 2023)
Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
0