Vigil@nce - Vigil@nce - faad2: buffer overflow via stszin(), analyzed on 28/03/2022
May 2022 by Vigil@nce
Vigil@nce - An attacker can trigger a buffer overflow of faad2, via stszin(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/faad2-buffer-overflow-via-stszin-37879