Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in ggml-org whisper.cpp up to 1.8.2. Affected is the function read_audio_data of the file /whisper.cpp/examples/common-whisper.cpp. The manipulation results in use after free. The attack requires a local approach. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | ggml-org whisper.cpp common-whisper.cpp read_audio_data use after free | |
| Weaknesses | CWE-119 CWE-416 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-12T19:22:15.061Z
Reserved: 2025-12-12T11:27:00.916Z
Link: CVE-2025-14569
Updated: 2025-12-12T19:22:11.840Z
Status : Received
Published: 2025-12-12T19:16:01.610
Modified: 2025-12-12T19:16:01.610
Link: CVE-2025-14569
No data.
OpenCVE Enrichment
No data.