Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2023-30207

Disclosure Date: July 05, 2023 (last updated February 25, 2025)
A divide by zero issue discovered in Kodi Home Theater Software 19.5 and earlier allows attackers to cause a denial of service via use of crafted mp3 file.
Attacker Value
Unknown

CVE-2023-23082

Disclosure Date: February 03, 2023 (last updated February 24, 2025)
A heap buffer overflow vulnerability in Kodi Home Theater Software up to 19.5 allows attackers to cause a denial of service due to an improper length of the value passed to the offset argument.
Attacker Value
Unknown

CVE-2021-42917

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.
Attacker Value
Unknown

CVE-2018-8831

Disclosure Date: April 18, 2018 (last updated November 26, 2024)
A Persistent XSS vulnerability exists in Kodi (formerly XBMC) through 17.6 that allows the execution of arbitrary HTML/script code in the context of the victim user's browser via a playlist.
0
Attacker Value
Unknown

CVE-2018-1000047

Disclosure Date: February 09, 2018 (last updated November 26, 2024)
NASA Kodiak version v1.0 contains a CWE-502 vulnerability in Kodiak library's data processing function that can result in remote code execution. This attack appear to be exploitable via Victim opens an untrusted file for optimization using Kodiak library.
0
Attacker Value
Unknown

CVE-2017-8314

Disclosure Date: May 23, 2017 (last updated November 26, 2024)
Directory Traversal in Zip Extraction built-in function in Kodi 17.1 and earlier allows arbitrary file write on disk via a Zip file as subtitles.
0
Attacker Value
Unknown

CVE-2017-5982

Disclosure Date: February 28, 2017 (last updated January 23, 2024)
Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
0