CVE-2021-27229
- EPSS 2.6%
- Veröffentlicht 16.02.2021 04:15:12
- Zuletzt bearbeitet 21.11.2024 05:57:38
Mumble before 1.3.4 allows remote code execution if a victim navigates to a crafted URL on a server list and clicks on the Open Webpage text.
CVE-2020-13962
- EPSS 1.57%
- Veröffentlicht 09.06.2020 00:15:10
- Zuletzt bearbeitet 21.11.2024 05:02:14
Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session ...
CVE-2010-2490
- EPSS 0.5%
- Veröffentlicht 31.10.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 01:16:45
Mumble: murmur-server has DoS due to malformed client query
CVE-2018-20743
- EPSS 7.52%
- Veröffentlicht 25.01.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:02:04
murmur in Mumble through 1.2.19 before 2018-08-31 mishandles multiple concurrent requests that are persisted in the database, which allows remote attackers to cause a denial of service (daemon hang or crash) via a message flood.
- EPSS 0.6%
- Veröffentlicht 16.11.2014 11:59:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated b...
- EPSS 1.12%
- Veröffentlicht 16.11.2014 11:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The QSvg module in Qt, as used in the Mumble client 1.2.x before 1.2.6, allows remote attackers to cause a denial of service (hang and resource consumption) via a local file reference in an (1) image tag or (2) XML stylesheet in an SVG file.
CVE-2012-0863
- EPSS 0.04%
- Veröffentlicht 30.04.2012 14:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
Mumble 1.2.3 and earlier uses world-readable permissions for .local/share/data/Mumble/.mumble.sqlite files in home directories, which might allow local users to obtain a cleartext password and configuration data by reading a file.