cijliu librtsp har 2ec1a81ad65280568a0c7c16420d7c10fde13b04 rtsp_parse_request Pufferüberlauf
Gaskiya vulnerability da aka ware a matsayin kura an samu a cijliu librtsp har 2ec1a81ad65280568a0c7c16420d7c10fde13b04. Hakika, aikin rtsp_parse_request ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil $software_file, a cikin sashen $software_component. A sa manipulation ka Pufferüberlauf. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-120. Hakika, rauni an bayyana shi 01/17/2026. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2026-1109. Wuroo ka a yiɗi a yi ɗum e laawol gese. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. 0-day shima, an ndiyam a wuro be $0-$5k. Wannan samfur yana amfani da rolling release don ci gaba da isar da sabuntawa. Don haka, babu bayanan sigar da abin ya shafa ko sabunta sigar da ake da su. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
5 Goyarwa · 102 Datenpunkte