cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2022-40775
2022-09-18T19:15:09.323
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_StszAtom::WriteFields.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/758" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/758
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi there, I use my fuzzer for fuzzing the binary mp4decrypt, and this binary crashes with the following: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==24087==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000702ee8 bp 0x7ffcf40a75f0 s...
SEGV error
https://api.github.com/repos/axiomatic-systems/Bento4/issues/758/comments
0
2022-09-17T06:02:37Z
2023-06-26T09:41:06Z
https://github.com/axiomatic-systems/Bento4/issues/758
1,376,678,566
758
CVE-2022-40008
2022-09-20T20:15:10.510
SWFTools commit 772e55a was discovered to contain a heap-buffer overflow via the function readU8 at /lib/ttf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:2021-12-16:*:*:*:*:*:*:*", "matchCriteriaId": "BB9D1BB0-75D0-4C0B-8297-540D6A24F722", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/matthiaskramm/swftools/issues/188
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
system info Ubuntu x86_64, clang 10.0, ttftool (latest master https://github.com/matthiaskramm/swftools/commit/772e55a271f66818b06c6e8c9b839befa51248f4) Command line ./src/ttftool poc ``` ================================================================= ==26368==ERROR: AddressSanitizer: heap-buffer-overflow on ...
heap-buffer-overflow exists in the function readU8 in lib/ttf.c
https://api.github.com/repos/swftools/swftools/issues/188/comments
0
2022-07-28T08:51:57Z
2022-07-28T08:59:46Z
https://github.com/swftools/swftools/issues/188
1,320,609,012
188
CVE-2022-40009
2022-09-20T20:15:10.550
SWFTools commit 772e55a was discovered to contain a heap-use-after-free via the function grow_unicode at /lib/ttf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:2021-12-16:*:*:*:*:*:*:*", "matchCriteriaId": "BB9D1BB0-75D0-4C0B-8297-540D6A24F722", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/matthiaskramm/swftools/issues/190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
system info Ubuntu x86_64, clang 10.0, ttftool (latest master https://github.com/matthiaskramm/swftools/commit/772e55a271f66818b06c6e8c9b839befa51248f4) Command line ./src/ttftool poc ``` ================================================================= ==26408==ERROR: AddressSanitizer: heap-use-after-free on a...
heap-use-after-free exists in the function grow_unicode in /lib/ttf.c
https://api.github.com/repos/swftools/swftools/issues/190/comments
0
2022-07-28T08:56:02Z
2022-07-28T08:59:20Z
https://github.com/swftools/swftools/issues/190
1,320,614,087
190
CVE-2022-35085
2022-09-21T00:15:10.207
SWFTools commit 772e55a2 was discovered to contain a memory leak via /lib/mem.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35085.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/matthiaskramm/swftools/issues/181
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
Hi, I currently learn to use fuzz tech to detect bugs and I found something in this repo. in order to reproduce the crash info, please attach ASAN when you compile this repo. # gif2swf ## heap-buffer-overflow ### reproduce please use command : `./gif2swf -o /dev/null [sample file]` to reproduce the cras...
bug found in swftools-gif2swf
https://api.github.com/repos/swftools/swftools/issues/181/comments
0
2022-07-03T08:28:59Z
2022-07-04T03:28:11Z
https://github.com/swftools/swftools/issues/181
1,292,243,070
181
CVE-2022-41841
2022-09-30T05:15:11.260
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_File::ParseStream in Core/Ap4File.cpp, which is called from AP4_File::AP4_File.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/779" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/779
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, I use my fuzzer to fuzz binary mp4tag and binary mp42hevc , and found some crashes. The bug1 is different from issue #295, because i run the test-001.mp4 finding it useless. Here are the details. # Bug1 ``` ┌──(kali㉿kali)-[~/Desktop/Bento4/cmakebuild] └─$ ./mp4tag mp4tag_poc ...
There are some vulnerabilities in Bento4
https://api.github.com/repos/axiomatic-systems/Bento4/issues/779/comments
0
2022-09-27T08:01:55Z
2023-06-26T06:51:17Z
https://github.com/axiomatic-systems/Bento4/issues/779
1,387,303,483
779
CVE-2022-41845
2022-09-30T05:15:11.787
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_Array<AP4_ElstEntry>::EnsureCapacity in Core/Ap4Array.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/747" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/747
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, i find 3 out-of-memory errors in Bento4. I saved all my test files [here](https://github.com/WorldExecute/files/tree/main/Bento4) Here are the details. For **mp4audioclip** with [test input](https://github.com/WorldExecute/files/tree/main/Bento4/mp4audioclip/out-of-memory): ``` test_1: ====================...
out-of-memory
https://api.github.com/repos/axiomatic-systems/Bento4/issues/747/comments
0
2022-08-28T07:58:44Z
2023-05-29T02:53:16Z
https://github.com/axiomatic-systems/Bento4/issues/747
1,353,278,230
747
CVE-2022-41845
2022-09-30T05:15:11.787
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_Array<AP4_ElstEntry>::EnsureCapacity in Core/Ap4Array.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/747" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/770
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I use my fuzzer to fuzz binary mp4tag , the three binary all crashede, and shows that allocator is out of memory trying to allocate 0xxxxxxx bytes. Then I use the crash input to test binary mpesplit and mp42hevc,and all crashed beacuse of same situation. The version of Bento4 is the latest commit[5b7c...
there are some vulnerabilities in binary mp4tag
https://api.github.com/repos/axiomatic-systems/Bento4/issues/770/comments
0
2022-09-23T07:02:26Z
2023-06-26T06:33:03Z
https://github.com/axiomatic-systems/Bento4/issues/770
1,383,377,290
770
CVE-2022-41846
2022-09-30T05:15:11.870
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/342" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/342
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A crafted input will lead to Memory allocation failed in Ap4DataBuffer.cpp at Bento4 1.5.1-627 Triggered by ./mp42hls crash2.mp4 Poc [crash2.zip](https://github.com/axiomatic-systems/Bento4/files/2685099/crash2.zip) Bento4 Version 1.5.1-627 The ASAN information is as follows: ``` ==92387==ERROR: AddressSa...
Allocate for large amounts of memory failed in Ap4DataBuffer.cpp:210 at Bento4 1.5.1-627 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/342/comments
1
2018-12-17T08:48:55Z
2019-01-12T20:15:42Z
https://github.com/axiomatic-systems/Bento4/issues/342
391,610,142
342
CVE-2022-41847
2022-09-30T05:15:11.957
An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) in System/StdC/Ap4StdCFileByteStream.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/750" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/759
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
I use AFL when fuzzing and got some crashes. ================================================================= ==3780==ERROR: LeakSanitizer: detected memory leaks Direct leak of 48 byte(s) in 1 object(s) allocated from: #0 0x4c470d in operator new(unsigned long) (/home/hjsz/Bento4/cmakebuild/mp4fragment+0x4c4...
There are memory leaks in mp4fragment
https://api.github.com/repos/axiomatic-systems/Bento4/issues/759/comments
0
2022-09-17T08:19:32Z
2023-05-29T02:53:19Z
https://github.com/axiomatic-systems/Bento4/issues/759
1,376,705,591
759
CVE-2022-41847
2022-09-30T05:15:11.957
An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) in System/StdC/Ap4StdCFileByteStream.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/750" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/775
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, I use fuzer to test binary acc2mp4, and found some carshes, which can result binary mp4split crash too. Here are the details. # Bug1 ``` root@d5f4647d38bd:/aac2mp4/aac2mp4# /Bento4/build/aac2mp4 crash1 /dev/null AAC frame [000000]: size = -7, 96000 kHz, 0 ch =================================================...
there are some bugs in Bento4
https://api.github.com/repos/axiomatic-systems/Bento4/issues/775/comments
0
2022-09-24T07:42:46Z
2023-06-26T06:38:57Z
https://github.com/axiomatic-systems/Bento4/issues/775
1,384,568,694
775
CVE-2022-42003
2022-10-02T05:15:09.070
In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "0848F177-1977-4C9C-B91A-7374FF25F335", "versionEndExcluding": "2.12.7.1", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/3590
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
TL;DNR: Fix included in: * 2.14.0 once released (until then, 2.14.0-rc1 and rc2) * 2.13.4.2 micro-patch (jackson-bom 2.13.4.20221013). (NOTE: 2.13.4.1/2.13.4.20221012 have an issue that affects Gradle users) * 2.12.7.1 micro-patch (jackson-bom 2.12.7.20221012) ----- (note: similar to #3582 ) (note: orig...
Add check in primitive value deserializers to avoid deep wrapper array nesting wrt `UNWRAP_SINGLE_VALUE_ARRAYS` [CVE-2022-42003]
https://api.github.com/repos/FasterXML/jackson-databind/issues/3590/comments
44
2022-09-06T00:30:48Z
2022-10-19T23:09:52Z
https://github.com/FasterXML/jackson-databind/issues/3590
1,362,567,066
3,590
CVE-2022-42004
2022-10-02T05:15:09.237
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "0848F177-1977-4C9C-B91A-7374FF25F335", "versionEndExcluding": "2.12.7.1", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/3582
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Fix included in * 2.13.4 * 2.12.7.1 micro-patch (jackson-bom 2.12.7.20221012) ---- (note: found by oss-fuzz, see: https://bugs.chromium.org/p/oss-fuzz/issues) Currently feature `DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS` is supported by most types, and deserializers tend to implement support using ...
Add check in `BeanDeserializer._deserializeFromArray()` to prevent use of deeply nested arrays [CVE-2022-42004]
https://api.github.com/repos/FasterXML/jackson-databind/issues/3582/comments
28
2022-08-24T03:17:04Z
2023-08-10T09:01:37Z
https://github.com/FasterXML/jackson-databind/issues/3582
1,348,789,667
3,582
CVE-2022-41419
2022-10-03T14:15:22.013
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_Processor::Process function in the mp4encrypt binary.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/766" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/766
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary mp4encrypt, and a crash incurred, i.e., memory leaks error. The version of Bento4 is the latest (the newest master branch) and the operation system is Ubuntu 18.04.6 LTS (docker). The following is the details. # Details ``` root@c08635047aea:/fuzz-mp4encryp...
Detected memory leaks in mp4encrypt
https://api.github.com/repos/axiomatic-systems/Bento4/issues/766/comments
0
2022-09-20T01:45:02Z
2023-06-26T05:57:20Z
https://github.com/axiomatic-systems/Bento4/issues/766
1,378,706,570
766
CVE-2022-41423
2022-10-03T14:15:22.743
Bento4 v1.6.0-639 was discovered to contain a segmentation violation in the mp4fragment component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/767" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/767
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi there, I use my fuzzer for fuzzing the binary mp4fragment, the version of Bento4 is the latest (the newest master branch) and the operation system is Ubuntu 18.04.6 LTS (docker) and this binary crashes with the following. # Details ``` root@4e3b7f9edc0d:/mp4box/mp4fragment# ./mp4fragment ../out/crash...
From mp4fragment: SEGV on unknown address 0x000000000000
https://api.github.com/repos/axiomatic-systems/Bento4/issues/767/comments
0
2022-09-21T14:23:53Z
2023-06-26T05:26:52Z
https://github.com/axiomatic-systems/Bento4/issues/767
1,381,022,528
767
CVE-2022-41424
2022-10-03T14:15:23.097
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_SttsAtom::Create function in mp42hls.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/768" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/768
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi there, I tested the binary mp42hls, the version of Bento4 is the latest (the newest master branch) and the operation system is Ubuntu 18.04.6 LTS (docker) and this binary crash with the following. # Details ``` root@2e47aa8b3277:/test_mp42hls# ./mp42hls --audio-track-id 2 ./mp42hls\-poc\-1 ERROR: ...
Detected memory leaks in mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/768/comments
0
2022-09-21T16:36:04Z
2023-06-26T05:25:33Z
https://github.com/axiomatic-systems/Bento4/issues/768
1,381,208,895
768
CVE-2022-41425
2022-10-03T14:15:23.473
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4decrypt.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/772" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/772
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi there, These are some faults that maybe lead to serious consequences in mp4xx, the version of Bento4 is the latest (the newest master branch) and the operation system is Ubuntu 18.04.6 LTS (docker), these binary-crashes with the following. # Bug1 Detected memory leaks in mp4spilt: ``` root@3234...
Some vulnerabilities about mp4xx can cause serious errors
https://api.github.com/repos/axiomatic-systems/Bento4/issues/772/comments
0
2022-09-23T15:37:03Z
2023-06-26T05:24:50Z
https://github.com/axiomatic-systems/Bento4/issues/772
1,383,983,547
772
CVE-2022-41428
2022-10-03T14:15:24.697
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadBits function in mp4mux.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/773" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/773
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found three heap buffer overflow bugs in AP4_Atom::TypeFromString(char const*), AP4_BitReader::ReadBit() and AP4_BitReader::ReadBits(unsigned int). They come from mp4tag and mp4mux, respectively. # Bug1 Heap-buffer-overflow on address 0x602000000332 in mp4tag: ``` root@728d9sls452:/fuzz-mp...
Some heap-buffer-overflow bugs in Bento4
https://api.github.com/repos/axiomatic-systems/Bento4/issues/773/comments
0
2022-09-23T16:44:03Z
2023-06-12T07:07:50Z
https://github.com/axiomatic-systems/Bento4/issues/773
1,384,054,185
773
CVE-2022-41500
2022-10-18T23:15:09.380
EyouCMS V1.5.9 was discovered to contain multiple Cross-Site Request Forgery (CSRF) vulnerabilities via the Members Center, Editorial Membership, and Points Recharge components.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/27#issue-1410014422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/27#issue-1410014422
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
A security vulnerability exists in EyouCMS V1.5.9 in the backend, Members Center, Editing Membership, and Points Top-up. 1. Enter the background - > member center - > edit member - > points recharge, as shown in the figure: ![图片1](https://user-images.githubusercontent.com/83074322/195964323-3288f8b0-e780-437d-9c63-1e...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/27/comments
1
2022-10-15T02:26:03Z
2023-02-28T02:38:51Z
https://github.com/weng-xianhu/eyoucms/issues/27
1,410,014,422
27
CVE-2022-43032
2022-10-19T14:15:09.853
An issue was discovered in Bento4 v1.6.0-639. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp, as demonstrated by mp42aac.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/763" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/763
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing memory leaks. Here is the ASAN mode output: ================================================================= ==19530==ERROR: LeakSanitizer: detected memory leaks Direct leak of 80 byte(s) in 1 obje...
Memory leaks with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/763/comments
0
2022-09-19T06:18:05Z
2022-09-19T06:18:05Z
https://github.com/axiomatic-systems/Bento4/issues/763
1,377,456,877
763
CVE-2022-43033
2022-10-19T14:15:09.897
An issue was discovered in Bento4 1.6.0-639. There is a bad free in the component AP4_HdlrAtom::~AP4_HdlrAtom() which allows attackers to cause a Denial of Service (DoS) via a crafted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/765" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/765
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing attempting free on address which was not malloc. Here is the ASAN mode output: ==9252==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x60200000ef50 in thread T0 #0 ...
Bad-free with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/765/comments
0
2022-09-19T06:29:50Z
2023-05-29T02:51:08Z
https://github.com/axiomatic-systems/Bento4/issues/765
1,377,466,423
765
CVE-2022-43034
2022-10-19T14:15:09.943
An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/764" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/764
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42ts instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output: ==10897==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000ec3c at pc 0x0000004a9771 bp 0x7fffffffb150 sp 0x7fffffffb140 READ of size...
Heap-buffer-overflow with ASAN in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/764/comments
0
2022-09-19T06:24:55Z
2022-09-19T06:24:55Z
https://github.com/axiomatic-systems/Bento4/issues/764
1,377,462,592
764
CVE-2022-43035
2022-10-19T14:15:09.990
An issue was discovered in Bento4 v1.6.0-639. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/762" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/762
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: Thanks for your fix of issue #751 In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output: ==27304==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000ed28 at pc 0x0000005a64d9 bp 0x7ffffff...
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/762/comments
0
2022-09-19T06:13:40Z
2022-09-19T06:18:56Z
https://github.com/axiomatic-systems/Bento4/issues/762
1,377,452,573
762
CVE-2022-43037
2022-10-19T14:15:10.043
An issue was discovered in Bento4 1.6.0-639. There is a memory leak in the function AP4_File::ParseStream in /Core/Ap4File.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/788" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/788
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing memory leaks. Here is the ASAN mode output. The output is different from #763. ================================================================= ==6659==ERROR: LeakSanitizer: detected memory leaks D...
Memory leaks with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/788/comments
0
2022-10-04T06:40:25Z
2023-05-29T02:51:19Z
https://github.com/axiomatic-systems/Bento4/issues/788
1,395,742,603
788
CVE-2022-43038
2022-10-19T14:15:10.090
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadCache() function in mp42ts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/787" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/787
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42ts instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output. The output is different from #764 ================================================================= ==3902==ERROR: AddressSanitizer: heap-buffer-overf...
Heap-buffer-overflow with ASAN in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/787/comments
0
2022-10-04T06:36:03Z
2023-05-29T02:51:18Z
https://github.com/axiomatic-systems/Bento4/issues/787
1,395,738,652
787
CVE-2022-43039
2022-10-19T14:15:10.137
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_isom_meta_restore_items_ref at /isomedia/meta.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2281" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2281
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description SEGV in isomedia/meta.c:1929 in gf_isom_meta_restore_items_ref ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https...
SEGV isomedia/meta.c:1929 in gf_isom_meta_restore_items_ref
https://api.github.com/repos/gpac/gpac/issues/2281/comments
0
2022-10-09T08:34:59Z
2022-10-10T15:44:28Z
https://github.com/gpac/gpac/issues/2281
1,402,199,623
2,281
CVE-2022-43040
2022-10-19T14:15:10.183
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function gf_isom_box_dump_start_ex at /isomedia/box_funcs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2280" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2280
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Heap-buffer-overflow in isomedia/box_funcs.c:2074 in gf_isom_box_dump_start_ex ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPA...
heap-buffer-overflow isomedia/box_funcs.c:2074 in gf_isom_box_dump_start_ex
https://api.github.com/repos/gpac/gpac/issues/2280/comments
0
2022-10-09T08:31:37Z
2022-10-10T15:44:28Z
https://github.com/gpac/gpac/issues/2280
1,402,198,804
2,280
CVE-2022-43042
2022-10-19T14:15:10.227
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function FixSDTPInTRAF at isomedia/isom_intern.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2278" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2278
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Heap-buffer-overflow in isomedia/isom_intern.c:227 in FixSDTPInTRAF ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: ...
heap-buffer-overflow isomedia/isom_intern.c:227 in FixSDTPInTRAF
https://api.github.com/repos/gpac/gpac/issues/2278/comments
0
2022-10-09T08:21:31Z
2022-10-10T15:44:27Z
https://github.com/gpac/gpac/issues/2278
1,402,196,162
2,278
CVE-2022-43043
2022-10-19T14:15:10.273
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function BD_CheckSFTimeOffset at /bifs/field_decode.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2276" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2276
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description SEGV in BD_CheckSFTimeOffset bifs/field_decode.c:58 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi....
SEGV BD_CheckSFTimeOffset bifs/field_decode.c:58
https://api.github.com/repos/gpac/gpac/issues/2276/comments
0
2022-10-09T08:13:42Z
2022-10-10T15:44:26Z
https://github.com/gpac/gpac/issues/2276
1,402,194,113
2,276
CVE-2022-43044
2022-10-19T14:15:10.317
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_isom_get_meta_item_info at /isomedia/meta.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2282" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2282
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description SEGV in isomedia/meta.c:177 in gf_isom_get_meta_item_info ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://do...
SEGV isomedia/meta.c:177 in gf_isom_get_meta_item_info
https://api.github.com/repos/gpac/gpac/issues/2282/comments
0
2022-10-09T08:38:17Z
2022-10-10T15:44:29Z
https://github.com/gpac/gpac/issues/2282
1,402,200,347
2,282
CVE-2022-43045
2022-10-19T14:15:10.357
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_dump_vrml_sffield at /scene_manager/scene_dump.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2277" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2277
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description SEGV scene_manager/scene_dump.c:693 in gf_dump_vrml_sffield ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://...
SEGV scene_manager/scene_dump.c:693 in gf_dump_vrml_sffield
https://api.github.com/repos/gpac/gpac/issues/2277/comments
0
2022-10-09T08:18:14Z
2022-10-10T15:44:26Z
https://github.com/gpac/gpac/issues/2277
1,402,195,329
2,277
CVE-2022-40885
2022-10-19T18:15:13.287
Bento4 v1.6.0-639 has a memory allocation issue that can cause denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/761" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yangfar/CVE/blob/main/CVE-2022-40885.md" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/761
[ "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello,I use the fuzzer(AFL) to fuzz binary mp42avc and got some crashes which show that allocator is out of memory trying to allocate 0xXXXXXXXX bytes when method new is called. The following is the details. ### Bug1 #### ./mp42avc ~/out/crashes/id\:000017\,sig\:06\,src\:000925+000617\,op\:splice\,rep\:128 3.avc ==...
Out of memory in Ap4DataBuffer:new AP4_Byte[buffer_size]
https://api.github.com/repos/axiomatic-systems/Bento4/issues/761/comments
0
2022-09-19T00:56:17Z
2023-05-29T02:53:19Z
https://github.com/axiomatic-systems/Bento4/issues/761
1,377,242,122
761
CVE-2022-3662
2022-10-26T19:15:17.857
A vulnerability was found in Axiomatic Bento4. It has been declared as critical. This vulnerability affects the function GetOffset of the file Ap4Sample.h of the component mp42hls. The manipulation leads to use after free. The attack can be initiated remotely. The exploit has been disclosed to the public and may be use...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/802
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in mp42hls, GetOffset, Ap4Sample.h:99, in the newest commit 5e7bb34a08272c49242196eba1cefab8af55f381. This seems to be an incomplete fix of issue #461. Here is the reproducing command: ~~~~ ./mp42hls poc ~~~~ POC: [mp42hls_cuaf_Ap4Sample99.zip](https://github.com/axi...
Concurrent heap use after free in mp42hls, GetOffset, Ap4Sample.h:99
https://api.github.com/repos/axiomatic-systems/Bento4/issues/802/comments
0
2022-10-19T06:53:27Z
2023-05-29T02:40:07Z
https://github.com/axiomatic-systems/Bento4/issues/802
1,414,407,802
802
CVE-2022-3663
2022-10-26T19:15:19.093
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. This issue affects the function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/800
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is a segmentation fault caused by null pointer dereference in MP4fragment, Ap4StsdAtom.cpp:75 in the newest commit 5e7bb34a08272c49242196eba1cefab8af55f381. The reason for this issue is that the return value of the GetSampleDescription is unchecked. <img width="1055" alt="image" src="https://use...
Segmentation fault caused by null pointer dereference in MP4fragment, Ap4StsdAtom.cpp:75
https://api.github.com/repos/axiomatic-systems/Bento4/issues/800/comments
0
2022-10-19T06:06:34Z
2023-05-29T02:51:53Z
https://github.com/axiomatic-systems/Bento4/issues/800
1,414,350,784
800
CVE-2022-3664
2022-10-26T19:15:21.197
A vulnerability classified as critical has been found in Axiomatic Bento4. Affected is the function AP4_BitStream::WriteBytes of the file Ap4BitStream.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/794
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, developers of Bento4! I also found some **heap buffer overflow** bugs in avcinfo by using our fuzzing tools with ASAN. Here is details: ## Bug1 ``` ================================================================= ==48171==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000038 at pc 0x7f...
Some heap buffer overflow bugs exist in avcinfo
https://api.github.com/repos/axiomatic-systems/Bento4/issues/794/comments
0
2022-10-10T13:34:03Z
2023-05-29T02:51:50Z
https://github.com/axiomatic-systems/Bento4/issues/794
1,403,189,077
794
CVE-2022-3666
2022-10-26T19:15:23.570
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_LinearReader::Advance of the file Ap4LinearReader.cpp of the component mp42ts. The manipulation leads to use after free. The attack may be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/793
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, developers of Bento4. I found a heap use after free bug in AP4_LinearReader::Advance(bool) with ASAN. The following is the details. ### Details ``` ================================================================= ==32056==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000001f98 at pc 0x5609...
heap-use-after-free bug in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/793/comments
0
2022-10-10T08:51:58Z
2023-05-29T02:51:21Z
https://github.com/axiomatic-systems/Bento4/issues/793
1,402,818,781
793
CVE-2022-3667
2022-10-26T19:15:24.427
A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has bee...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/789
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: Thanks for your fix of issue #751 In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output. This issue may be because of an incomplete fix of #751. ===========================================================...
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/789/comments
0
2022-10-04T06:45:46Z
2023-05-29T02:51:19Z
https://github.com/axiomatic-systems/Bento4/issues/789
1,395,747,445
789
CVE-2022-3668
2022-10-26T19:15:25.300
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. This vulnerability affects the function AP4_AtomFactory::CreateAtomFromStream of the component mp4edit. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be u...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/776
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary mp4edit and mp42hevc with my fuzzer, and three crashes incurred, including two memory-leaks from mp4edit and a heap-overflow from mp42hevc. And I think Bug1 and Bug2 are different. The following is the details. # Bug1 Detected memory leaks in mp4edit. ```...
Memory-leak and heap-overflow bugs in Bento4
https://api.github.com/repos/axiomatic-systems/Bento4/issues/776/comments
0
2022-09-25T14:31:41Z
2023-05-29T02:51:14Z
https://github.com/axiomatic-systems/Bento4/issues/776
1,385,048,849
776
CVE-2022-43284
2022-10-28T21:15:10.083
Nginx NJS v0.7.2 to v0.7.4 was discovered to contain a segmentation violation via njs_scope_valid_value at njs_scope.h. NOTE: the vendor disputes the significance of this report because NJS does not operate on untrusted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/470" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DDAE5D-3253-48C1-8F20-270A3DEFA2F9", "versionEndExcluding": null, "versionEndIncluding": "0.7.4", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/470
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV njs_scope.h:85:10 in njs_scope_valid_value
https://api.github.com/repos/nginx/njs/issues/470/comments
0
2022-02-15T09:24:24Z
2022-06-02T04:56:07Z
https://github.com/nginx/njs/issues/470
1,138,408,738
470
CVE-2022-43284
2022-10-28T21:15:10.083
Nginx NJS v0.7.2 to v0.7.4 was discovered to contain a segmentation violation via njs_scope_valid_value at njs_scope.h. NOTE: the vendor disputes the significance of this report because NJS does not operate on untrusted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/470" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DDAE5D-3253-48C1-8F20-270A3DEFA2F9", "versionEndExcluding": null, "versionEndIncluding": "0.7.4", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/529
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.11.10 #1 SMP Sat Oct 30 23:40:08 CST 2021 x86_64 x86_64 x86_64 GNU/Linux Commit : c62a9fb92b102c90a66aa724cb9054183a33a68c Version : 0.7.4 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -fno-omit-frame-pointer" `...
SEGV njs_scope.h:86:10 in njs_scope_valid_value
https://api.github.com/repos/nginx/njs/issues/529/comments
1
2022-06-02T04:24:09Z
2022-06-02T04:57:43Z
https://github.com/nginx/njs/issues/529
1,257,667,476
529
CVE-2022-43285
2022-10-28T21:15:10.150
Nginx NJS v0.7.4 was discovered to contain a segmentation violation in njs_promise_reaction_job. NOTE: the vendor disputes the significance of this report because NJS does not operate on untrusted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/533" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "A12FD5A4-6946-49DD-95D4-154A8DA98F7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/533
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
#### Environment ``` OS : Linux ubuntu 5.13.0-44-generic #49~20.04.1-Ubuntu SMP Wed May 18 18:44:28 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : d09868bc71f9a990445959329ad8c1b10d3898f5 Version : 0.7.4 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
SEGV in njs_promise_reaction_job
https://api.github.com/repos/nginx/njs/issues/533/comments
0
2022-06-03T10:51:52Z
2022-10-11T02:36:10Z
https://github.com/nginx/njs/issues/533
1,259,761,132
533
CVE-2022-43286
2022-10-28T21:15:10.213
Nginx NJS v0.7.2 was discovered to contain a heap-use-after-free bug caused by illegal memory copy in the function njs_json_parse_iterator_call at njs_json.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/2ad0ea24a58d570634e09c2e58c3b314505eaa6a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1858598-78C6-451F-81B4-57F6D636EBAC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nul...
https://github.com/nginx/njs/issues/480
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Version : 0.7.2 Build : NJS_CFLAGS="$NJS_CFLAGS -fsanitize=address" NJS_CFLAGS="$NJS_CFLAGS -...
illegal memory copy in njs_json_parse_iterator_call of njs_json.c:1008
https://api.github.com/repos/nginx/njs/issues/480/comments
0
2022-03-02T11:45:19Z
2022-05-04T23:59:07Z
https://github.com/nginx/njs/issues/480
1,157,082,696
480
CVE-2022-3784
2022-10-31T21:15:12.497
A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/806
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in ReadBits, Ap4Mp4AudioInfo.cpp:66, in the newest master branch 5e7bb34a08272c49242196eba1cefab8af55f381, which seems to be incomplete fix of issue #194. Here is the reproducing command: ~~~~ mp42hls poc ~~~~ POC: [mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip](https://git...
Heap overflow in mp4hls, ReadBits, Ap4Mp4AudioInfo.cpp:66
https://api.github.com/repos/axiomatic-systems/Bento4/issues/806/comments
0
2022-10-24T06:03:44Z
2023-05-29T02:38:17Z
https://github.com/axiomatic-systems/Bento4/issues/806
1,420,268,717
806
CVE-2022-3785
2022-10-31T21:15:12.577
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/780
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary Avcinfo with my fuzzer, and a crash incurred—heap-buffer-overflow. The following is the details. I think this error is different from both #731 and #610. # Bug Detected heap-buffer-overflow in Avcinfo. ``` root@4w41awdas71:/# ./Bento4/cmakebuild/avcinfo ...
A heap-buffer-overflow in Avcinfo
https://api.github.com/repos/axiomatic-systems/Bento4/issues/780/comments
3
2022-09-27T18:09:33Z
2023-05-29T02:51:16Z
https://github.com/axiomatic-systems/Bento4/issues/780
1,388,166,902
780
CVE-2022-3807
2022-11-01T20:15:22.120
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Incomplete Fix CVE-2019-13238. The manipulation leads to resource consumption. The attack may be launched remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9820612/mp42aac_exhaustive_AP4_RtpAtom50.zip" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F13899-4DE7-4BC0-8E7F-8795F58AA99F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/axiomatic-systems/Bento4/issues/803
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A memory allocation failure unhandled in Ap4RtpAtom.cpp and leads to crashes. This seems to be an incomplete fix of issue #396, CVE-2019-13238. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4RtpAtom.cpp <img width="929" alt="image" src="https://user-images.githubusercontent.com/7632714/196694985-02c...
Incomplete fix of CVE-2019-13238, Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/803/comments
0
2022-10-19T12:55:56Z
2022-10-19T12:55:56Z
https://github.com/axiomatic-systems/Bento4/issues/803
1,414,926,196
803
CVE-2022-3812
2022-11-01T22:15:12.027
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is the function AP4_ContainerAtom::AP4_ContainerAtom of the component mp4encrypt. The manipulation leads to memory leak. The attack may be launched remotely. The exploit has been disclosed to the public and may be us...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/792
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# **Summary** Hi, developers of Bento4, I tested the binary of bento4 with my fuzzer, and some memory-leak crashes incurred. Among them, Bug3-5 may be different from #771. The operation system is Ubuntu 18.04.6 LTS (docker), these crashes with the following. # **Bug1** Detected memory leaks in mp4encrypt, the bug...
Some Memory leaks exist in mp4xx
https://api.github.com/repos/axiomatic-systems/Bento4/issues/792/comments
0
2022-10-06T17:14:56Z
2023-06-26T05:55:54Z
https://github.com/axiomatic-systems/Bento4/issues/792
1,400,040,986
792
CVE-2021-37789
2022-11-02T13:15:10.037
stb_image.h 2.27 has a heap-based buffer over in stbi__jpeg_load, leading to Information Disclosure or Denial of Service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1178" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stb_project:stb:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "4EE9CD8E-67B3-4D15-A7D3-FD54FEE21B79", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/nothings/stb/issues/1178
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
[poc.zip](https://github.com/nothings/stb/files/6861922/poc.zip) I find heap-buffer-overflow in stbi__jpeg_load with lastest version: 2.27 `clang test.cpp -fsanitize=address -o test` ` ./test poc.jpg` ASAN log: ```================================================================= ==11092==ERROR: AddressSanitizer...
heap-buffer-overflow in stbi__jpeg_load
https://api.github.com/repos/nothings/stb/issues/1178/comments
2
2021-07-22T11:46:46Z
2023-01-22T23:03:31Z
https://github.com/nothings/stb/issues/1178
950,573,228
1,178
CVE-2022-43235
2022-11-02T14:15:12.197
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/337" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x262cc1) in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The vi...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_epel_pixels_8_sse
https://api.github.com/repos/strukturag/libde265/issues/337/comments
5
2022-10-10T14:26:02Z
2023-07-23T16:03:46Z
https://github.com/strukturag/libde265/issues/337
1,403,267,152
337
CVE-2022-43236
2022-11-02T14:15:12.607
Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/343" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Stack-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x14bef2) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile....
Stack-buffer-overflow in fallback-motion.cc: void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/343/comments
2
2022-10-10T15:01:43Z
2023-01-24T16:05:16Z
https://github.com/strukturag/libde265/issues/343
1,403,319,141
343
CVE-2022-43237
2022-11-02T14:15:12.827
Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via void put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/344" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/344
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Stack-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x148bb1) in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofi...
Stack-buffer-overflow in fallback-motion.cc: void put_epel_hv_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/344/comments
2
2022-10-10T15:06:43Z
2023-01-24T16:05:06Z
https://github.com/strukturag/libde265/issues/344
1,403,327,299
344
CVE-2022-43238
2022-11-02T14:15:12.990
Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/336" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/336
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description SUMMARY: AddressSanitizer: unknown-crash (/libde265/build/libde265/liblibde265.so+0x28fa79) in ff_hevc_put_hevc_qpel_h_3_v_3_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bi...
Unknown crash in sse-motion.cc: ff_hevc_put_hevc_qpel_h_3_v_3_sse
https://api.github.com/repos/strukturag/libde265/issues/336/comments
2
2022-10-10T14:04:51Z
2023-01-24T16:06:16Z
https://github.com/strukturag/libde265/issues/336
1,403,236,062
336
CVE-2022-43239
2022-11-02T14:15:13.140
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_chroma<unsigned short> in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/341" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/341
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x178e82) in void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 ------------...
Heap-buffer-overflow in motion.cc: mc_chroma<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/341/comments
2
2022-10-10T14:44:20Z
2023-01-24T16:05:35Z
https://github.com/strukturag/libde265/issues/341
1,403,293,231
341
CVE-2022-43240
2022-11-02T14:15:13.313
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_qpel_h_2_v_1_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/335" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/335
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x2831a1) in ff_hevc_put_hevc_qpel_h_2_v_1_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file mu...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_qpel_h_2_v_1_sse
https://api.github.com/repos/strukturag/libde265/issues/335/comments
2
2022-10-10T13:44:54Z
2023-01-24T16:06:27Z
https://github.com/strukturag/libde265/issues/335
1,403,205,674
335
CVE-2022-43241
2022-11-02T14:15:13.517
Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Unknown-crash (/libde265/build/libde265/liblibde265.so+0x27a238) in ff_hevc_put_hevc_qpel_v_3_8_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must be a r...
Crash in see-motion.cc: ff_hevc_put_hevc_qpel_v_3_8_sse
https://api.github.com/repos/strukturag/libde265/issues/338/comments
2
2022-10-10T14:34:34Z
2023-01-24T16:06:05Z
https://github.com/strukturag/libde265/issues/338
1,403,279,658
338
CVE-2022-43242
2022-11-02T14:15:13.637
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_luma<unsigned char> in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/340" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/340
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x1787af) in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- ...
Heap-buffer-overflow in motion.cc: mc_luma<unsigned char>
https://api.github.com/repos/strukturag/libde265/issues/340/comments
2
2022-10-10T14:40:58Z
2023-01-24T16:05:44Z
https://github.com/strukturag/libde265/issues/340
1,403,288,592
340
CVE-2022-43243
2022-11-02T14:15:13.797
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/339" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/339
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x25f5ed) in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_weighted_pred_avg_8_sse
https://api.github.com/repos/strukturag/libde265/issues/339/comments
2
2022-10-10T14:36:46Z
2023-01-24T16:05:54Z
https://github.com/strukturag/libde265/issues/339
1,403,282,810
339
CVE-2022-43244
2022-11-02T14:15:13.967
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/342" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/342
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x14b860) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.b...
Heap-buffer-overflow in fallback-motion.cc: in void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/342/comments
2
2022-10-10T14:58:45Z
2023-01-24T16:05:26Z
https://github.com/strukturag/libde265/issues/342
1,403,314,932
342
CVE-2022-43245
2022-11-02T14:15:14.123
Libde265 v1.0.8 was discovered to contain a segmentation violation via apply_sao_internal<unsigned short> in sao.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/352" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/352
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description SEGV /libde265/libde265/sao.cc:231 in void apply_sao_internal<unsigned short>(de265_image*, int, int, slice_segment_header const*, int, int, int, unsigned short const*, int, unsigned short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] video...
SEGV sao.cc: in void apply_sao_internal<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/352/comments
2
2022-10-10T15:37:10Z
2023-01-24T16:03:22Z
https://github.com/strukturag/libde265/issues/352
1,403,369,863
352
CVE-2022-43248
2022-11-02T14:15:14.393
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_weighted_pred_avg_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/349" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/349
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x146253) in put_weighted_pred_avg_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The v...
Heap-buffer-overflow in fallback-motion.cc: put_weighted_pred_avg_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/349/comments
2
2022-10-10T15:25:07Z
2023-01-24T16:03:47Z
https://github.com/strukturag/libde265/issues/349
1,403,353,624
349
CVE-2022-43249
2022-11-02T14:15:14.653
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/345" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/345
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x148fda) in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofil...
Heap-buffer-overflow in fallback-motion.cc: void put_epel_hv_fallback<unsigned short>(
https://api.github.com/repos/strukturag/libde265/issues/345/comments
7
2022-10-10T15:09:37Z
2023-01-24T16:04:57Z
https://github.com/strukturag/libde265/issues/345
1,403,331,318
345
CVE-2022-43250
2022-11-02T14:15:14.913
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/346" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/346
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x146a04) in put_qpel_0_0_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must ...
Heap-buffer-overflow in fallback-motion.cc: in put_qpel_0_0_fallback_16
https://api.github.com/repos/strukturag/libde265/issues/346/comments
2
2022-10-10T15:14:22Z
2023-01-24T16:04:19Z
https://github.com/strukturag/libde265/issues/346
1,403,337,666
346
CVE-2022-43252
2022-11-02T14:15:15.163
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/347" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x1465fb) in put_epel_16_fallback(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file...
Heap-buffer-overflow in fallback-motion.cc in put_epel_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/347/comments
2
2022-10-10T15:16:32Z
2023-01-24T16:04:09Z
https://github.com/strukturag/libde265/issues/347
1,403,340,599
347
CVE-2022-43253
2022-11-02T14:15:15.450
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_unweighted_pred_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/348" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/348
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x145b6b) in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must b...
Heap-buffer-overflow in fallback-motion.cc: put_unweighted_pred_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/348/comments
2
2022-10-10T15:23:13Z
2023-01-24T16:03:58Z
https://github.com/strukturag/libde265/issues/348
1,403,349,600
348
CVE-2022-43254
2022-11-02T14:15:15.637
GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_list_new at utils/list.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2284" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2284
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in gf_list_new utils/list.c:601 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.114...
Memory Leak in gf_list_new utils/list.c:601
https://api.github.com/repos/gpac/gpac/issues/2284/comments
0
2022-10-11T07:44:42Z
2022-10-11T11:02:16Z
https://github.com/gpac/gpac/issues/2284
1,404,158,827
2,284
CVE-2022-43255
2022-11-02T14:15:15.917
GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_odf_new_iod at odf/odf_code.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2285" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2285
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in gf_odf_new_iod odf/odf_code.c:415 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/1...
Memory Leak in gf_odf_new_iod odf/odf_code.c:415
https://api.github.com/repos/gpac/gpac/issues/2285/comments
0
2022-10-11T07:56:13Z
2022-10-11T11:02:17Z
https://github.com/gpac/gpac/issues/2285
1,404,173,443
2,285
CVE-2022-43372
2022-11-03T18:15:17.987
Emlog Pro v1.7.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /admin/store.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:1.7.1:*:*:*:pro:*:*:*", "matchCriteriaId": "BFC4BB7B-FCA0-4826-AD2E-790A7DBBDD17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/emlog/emlog/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
### **Which version of emlog do you using?** emlog_pro_1.7.1 ### **Expected behavior** Search store templates ### **Actual behavior** Reflected XSS vulnerabilities ### **Steps to reproduce the behavior** > Url:https://github.com/emlog/emlog/blob/master/admin/store.php > > poc:"%2F><img+src%3Dx+onerror%3Dale...
Reflected-XSS vulnerabilities via '/admin/store.php' #1
https://api.github.com/repos/emlog/emlog/issues/195/comments
1
2022-10-16T17:27:37Z
2022-10-19T15:57:30Z
https://github.com/emlog/emlog/issues/195
1,410,558,751
195
CVE-2022-3974
2022-11-13T10:15:10.333
A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is the function AP4_StdcFileByteStream::ReadPartial of the file Ap4StdCFileByteStream.cpp of the component mp4info. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:2022-10-08:*:*:*:*:*:*:*", "matchCriteriaId": "E6D96205-9447-4E3E-B05C-A45E8353CF6C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/axiomatic-systems/Bento4/issues/812
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in ReadPartial, Ap4StdCFileByteStream.cpp:341, in the newest master branch 5e7bb34a08272c49242196eba1cefab8af55f381, which seems to be incomplete fix of issue #510. Here is the reproducing command: ~~~~ mp42info poc ~~~~ POC: [mp4info_overflow_ReadPartial341.zip](htt...
Heap overflow in mp4info, ReadPartial, Ap4StdCFileByteStream.cpp:341
https://api.github.com/repos/axiomatic-systems/Bento4/issues/812/comments
0
2022-11-11T07:45:28Z
2022-11-11T07:46:10Z
https://github.com/axiomatic-systems/Bento4/issues/812
1,445,073,819
812
CVE-2022-0137
2022-11-14T18:15:15.903
A heap buffer overflow in image_set_mask function of HTMLDOC before 1.9.15 allows an attacker to write outside the buffer boundaries.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/71fe87878c9cbc3db429f5e5c70f28e4b3d96e3b" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "76FBE339-551C-4C28-B91E-6E18D158C9C7", "versionEndExcluding": "1.9.15", "versionEndIncluding": null, "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/461
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
# Heap-buffer-overflow in image_set_mask(image_t*, int, int, unsigned char) I've attached [poc.zip](https://github.com/michaelrsweet/htmldoc/files/7793648/poc.zip) that contains a malicious gif and a html file. To reproduce and get the segmentation fault: ``` $ unzip poc.zip $ htmldoc --webpage -f output.pdf...
Heap-buffer-overflow in image_set_mask(image_t*, int, int, unsigned char)
https://api.github.com/repos/michaelrsweet/htmldoc/issues/461/comments
2
2021-12-30T15:54:02Z
2021-12-30T18:34:58Z
https://github.com/michaelrsweet/htmldoc/issues/461
1,091,182,106
461
CVE-2022-43323
2022-11-14T20:15:17.740
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Top Up Balance component under the Edit Member module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/28#issue-1410026516" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/28#issue-1410026516
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the backend, member center, editing, Top up balance. To exploit this vulnerability, a quasi-prepared HTML file needs to be opened 1、Go to the background --> member center--> edit member--> Top up balance ![图片1](https://user-images.githubu...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/28/comments
1
2022-10-15T03:24:29Z
2023-02-28T02:38:05Z
https://github.com/weng-xianhu/eyoucms/issues/28
1,410,026,516
28
CVE-2022-44387
2022-11-14T20:15:18.233
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Basic Information component under the Edit Member module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/29
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the backend, member center, edit member profile. To exploit this vulnerability, a constructed HTML file needs to be opened 1. Enter the background - > member center - > edit members - > basic information ![图片1](https://user-images.githubu...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/29/comments
1
2022-10-27T13:36:23Z
2023-02-24T07:42:24Z
https://github.com/weng-xianhu/eyoucms/issues/29
1,425,651,916
29
CVE-2022-44389
2022-11-14T20:15:18.593
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Edit Admin Profile module. This vulnerability allows attackers to arbitrarily change Administrator account information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/30
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the background, edit the administrator profile. This vulnerability may cause the modification of personal information such as administrator password, mobile phone number, and email address. To exploit this vulnerability, a constructed HTML ...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/30/comments
1
2022-10-29T03:58:24Z
2023-02-21T02:49:11Z
https://github.com/weng-xianhu/eyoucms/issues/30
1,428,062,999
30
CVE-2022-44390
2022-11-14T20:15:18.950
A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/31
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version:V1.5.9-UTF8-SP1 ![图片1](https://user-images.githubusercontent.com/83074322/198816360-bae5d187-3aeb-4d61-be73-3c1d333fde57.png) 1、Go to the background --> basic information--> the record number and public security record number, and click the code mode to modify to the code mode. ![图片2](https://user-images.git...
EyouCMS v1.5.9 has multiple vulnerabilities, stored cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/31/comments
1
2022-10-29T06:04:09Z
2023-02-21T01:49:51Z
https://github.com/weng-xianhu/eyoucms/issues/31
1,428,108,510
31
CVE-2022-45280
2022-11-23T21:15:11.310
A cross-site scripting (XSS) vulnerability in the Url parameter in /login.php of EyouCMS v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
name:EyouCMS version: EyouCMS-V1.6.0-UTF8-SP1 Installation package [download:](https://www.eyoucms.com/rizhi/2022/1102/28642.html) ![image](https://user-images.githubusercontent.com/75592724/201087069-82587b7d-1043-4568-a3f8-72bc315b581d.png) Problematic packets: > POST /login.php?m=admin&c=Links&a=add&_ajax=1...
EyouCMS v1.6.0 existence stored cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/32/comments
1
2022-11-10T12:16:56Z
2023-02-21T01:34:50Z
https://github.com/weng-xianhu/eyoucms/issues/32
1,443,805,273
32
CVE-2022-45205
2022-11-25T17:15:11.007
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4128" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4128
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# SysDictMapper.xml queryDictTablePageList。You can see that no precompiling is performed <img width="960" alt="截屏2022-10-25 15 24 58" src="https://user-images.githubusercontent.com/60163868/197709842-99880e4f-25e4-4f5a-a2cb-4fa8dcca4db2.png"> # SysDictController.java <img width="1192" alt="截屏2022-10-25 15 25 29" ...
[CVE-2022-45205]/sys/dict/queryTableData is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4128/comments
2
2022-10-25T07:31:16Z
2022-12-01T07:35:33Z
https://github.com/jeecgboot/JeecgBoot/issues/4128
1,421,998,736
4,128
CVE-2022-45206
2022-11-25T17:15:11.060
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4129" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4129
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
[jeecg-boot漏洞.pdf](https://github.com/jeecgboot/jeecg-boot/files/9858362/jeecg-boot.pdf)
[CVE-2022-45206]/sys/duplicate/check存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4129/comments
12
2022-10-25T08:10:59Z
2024-04-21T07:44:09Z
https://github.com/jeecgboot/JeecgBoot/issues/4129
1,422,048,340
4,129
CVE-2022-45207
2022-11-25T17:15:11.117
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
java提供了原生的预编译sql语句,这样可以防止sql注入问题 # queryListWithPermission 下图没有进行预编译处理,建议换成#{},虽然项目现在没有使用这条语句,但不排除以后的可能,建议修复 <img width="1532" alt="截屏2022-10-25 10 48 22" src="https://user-images.githubusercontent.com/60163868/197670494-95f85eb2-ce58-43ee-9aef-02b9e07ba2b1.png"> # updateNullByEmptyString 下图也使用的是${} <img width="1...
[CVE-2022-45207]这里有几处没有换成预编译,但个人建议修复
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4127/comments
6
2022-10-25T06:07:32Z
2022-12-07T00:59:38Z
https://github.com/jeecgboot/JeecgBoot/issues/4127
1,421,911,807
4,127
CVE-2022-45208
2022-11-25T17:15:11.173
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4126
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# sysUserMapper.xml revertLogicDeleted. You can see that no precompiling is performed <img width="1048" alt="截屏2022-10-25 11 40 04" src="https://user-images.githubusercontent.com/60163868/197676949-8016d0d1-9874-45fd-ba3f-89c63d8a2c90.png"> # SysUserController.java <img width="1278" alt="截屏2022-10-25 11 40 32" sr...
[CVE-2022-45208]/sys/user/putRecycleBin is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4126/comments
2
2022-10-25T03:44:24Z
2022-12-07T01:05:07Z
https://github.com/jeecgboot/JeecgBoot/issues/4126
1,421,795,524
4,126
CVE-2022-45210
2022-11-25T17:15:11.230
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# sysUserMapper.xml deleteLogicDeleted. You can see that no precompiling is performed <img width="617" alt="截屏2022-10-25 11 04 50" src="https://user-images.githubusercontent.com/60163868/197672626-fb8257e3-ca86-484e-a4aa-e878ebb31c34.png"> # SysUserController.java <img width="811" alt="截屏2022-10-25 11 06 04" src="...
[CVE-2022-45210]/sys/user/deleteRecycleBin is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4125/comments
2
2022-10-25T03:12:40Z
2022-12-07T01:16:36Z
https://github.com/jeecgboot/JeecgBoot/issues/4125
1,421,774,671
4,125
CVE-2022-45202
2022-11-29T04:15:11.207
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2296" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2296
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Stack buffer overflow in function dimC_box_read at isomedia/box_code_3gpp.c:1070 ### System info ubuntu 20.04 lts ### version info: ··· /MP4Box -version MP4Box - GPAC version 2.1-DEV-rev428-gcb8ae46c8-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please ...
Stack buffer overflow in function dimC_box_read at isomedia/box_code_3gpp.c:1070
https://api.github.com/repos/gpac/gpac/issues/2296/comments
1
2022-10-31T01:21:46Z
2022-11-04T08:28:44Z
https://github.com/gpac/gpac/issues/2296
1,429,110,423
2,296
CVE-2022-45204
2022-11-29T04:15:11.253
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2307" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2307
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in dimC_box_read at isomedia/box_code_3gpp.c:1060 ### System info ubuntu 20.04 lts ### version info: ``` ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev460-g9d963dc62-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in y...
Memory Leak in dimC_box_read at isomedia/box_code_3gpp.c:1060
https://api.github.com/repos/gpac/gpac/issues/2307/comments
1
2022-11-07T12:35:15Z
2022-11-08T02:28:56Z
https://github.com/gpac/gpac/issues/2307
1,438,293,014
2,307
CVE-2022-4202
2022-11-29T09:15:09.460
A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1HVWa6IpAbvsMS5rx091RfjUB4GfXrMLE/view" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev490-g68064e101-master:*:*:*:*:*:*:*", "matchCriteriaId": "C49A23A9-D02C-438B-8283-93F59CD58E1D", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2333
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ Hi, a CVE was issued affecting gpac and I wasn't able to find any report here or any fix. [VulDB has a "writeup"](https://vuldb.com/?id.21451...
Integer Overflow in function lsr_translate_coords at laser/lsr_dec.c:856 (CVE-2022-4202)
https://api.github.com/repos/gpac/gpac/issues/2333/comments
2
2022-11-29T22:29:30Z
2022-12-13T21:31:57Z
https://github.com/gpac/gpac/issues/2333
1,468,785,287
2,333
CVE-2022-45343
2022-11-29T16:15:09.293
GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2315" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2315
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
# Description Heap use after free in Q_IsTypeOn at gpac/src/bifs/unquantize.c:175:12 # System info Ubuntu 20.04 lts # Version info ```shell MP4Box - GPAC version 2.1-DEV-rev478-g696e6f868-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your r...
Heap use after free in Q_IsTypeOn at gpac/src/bifs/unquantize.c
https://api.github.com/repos/gpac/gpac/issues/2315/comments
0
2022-11-14T01:55:34Z
2022-11-14T13:45:21Z
https://github.com/gpac/gpac/issues/2315
1,447,239,893
2,315
CVE-2022-45332
2022-11-30T03:15:13.973
LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/524" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4643:*:*:*:*:*:*:*", "matchCriteriaId": "8B1D693A-7DFD-40CC-B3E7-D2B6E5F5ADD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/LibreDWG/libredwg/issues/524
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
**System info** Ubuntu x86_64, clang 10.0 version: 0.12.4.4643, last commit [93c2512](https://github.com/LibreDWG/libredwg/commit/93c25124c191987af168ace9fe4b5623061874bd) **Command line** ./dwg2dxf poc **Poc** poc: [poc](https://github.com/iorra-cifer/Poc/blob/main/libredwg/heap-buffer-overflow?raw=true) ...
heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c
https://api.github.com/repos/LibreDWG/libredwg/issues/524/comments
1
2022-11-13T04:23:10Z
2022-11-30T12:14:12Z
https://github.com/LibreDWG/libredwg/issues/524
1,446,725,478
524
CVE-2022-45283
2022-12-06T00:15:10.257
GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the smil_parse_time_list parameter at /scenegraph/svg_attributes.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2295" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2295
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
GPAC-2.0.0 MP4Box: stack overflow with unlimited length and controllable content in smil_parse_time_list
https://api.github.com/repos/gpac/gpac/issues/2295/comments
0
2022-10-29T18:52:22Z
2022-11-04T08:28:14Z
https://github.com/gpac/gpac/issues/2295
1,428,405,742
2,295
CVE-2022-4584
2022-12-17T13:15:09.483
A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/818
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: When I tested the latest mp42aac, the following crash occurred. ## The problem The optput of mp42aac_asan: ``` ==115490==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ee71 at pc 0x000000509921 bp 0x7fffffffd410 sp 0x7fffffffd400 READ of size 1 at 0x60200000ee71 th...
heap-buffer-overflow in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/818/comments
0
2022-11-26T08:35:48Z
2023-05-29T02:39:18Z
https://github.com/axiomatic-systems/Bento4/issues/818
1,465,089,664
818
CVE-2020-10650
2022-12-26T20:15:10.433
A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/commit/a424c038ba0c0d65e579e22001dec925902ac0ef" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "238F4D80-C84C-4C96-B45D-D73ADE46A3C8", "versionEndExcluding": null, "versionEndIncluding": "2.9.10.4", "versi...
https://github.com/FasterXML/jackson-databind/issues/2658
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type reported regarding a class of `ignite-jta`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10650 Reporter: Srikanth Ramu, threedr3am'follower (2 concurrent reports) Fix wil...
Block one more gadget type (ignite-jta, CVE-2020-10650)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2658/comments
0
2020-03-15T23:59:21Z
2020-03-18T22:57:39Z
https://github.com/FasterXML/jackson-databind/issues/2658
581,881,392
2,658
CVE-2022-46489
2023-01-05T15:15:10.483
GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the gf_isom_box_parse_ex function at box_funcs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2328" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2328
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A memory leak has occurred when running program MP4Box, this can reproduce on the lattest commit. ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev505-gb9577e6ad-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our wor...
Memory leak in gf_isom_box_parse_ex function of box_funcs.c:166:13
https://api.github.com/repos/gpac/gpac/issues/2328/comments
0
2022-11-28T06:47:39Z
2022-11-28T10:06:52Z
https://github.com/gpac/gpac/issues/2328
1,465,902,126
2,328
CVE-2022-46490
2023-01-05T15:15:10.527
GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the afrt_box_read function at box_code_adobe.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2327
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A memory leak has occurred when running program MP4Box, this can reproduce on the lattest commit. ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev505-gb9577e6ad-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our wor...
Memory leak in afrt_box_read function of box_code_adobe.c:706:35
https://api.github.com/repos/gpac/gpac/issues/2327/comments
0
2022-11-28T06:30:26Z
2022-11-28T10:06:51Z
https://github.com/gpac/gpac/issues/2327
1,465,889,278
2,327
CVE-2022-47086
2023-01-05T15:15:10.573
GPAC MP4Box v2.1-DEV-rev574-g9d5bb184b contains a segmentation violation via the function gf_sm_load_init_swf at scene_manager/swf_parse.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2337" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
missing check in gf_sm_load_init_swf, causing Segmentation fault
https://api.github.com/repos/gpac/gpac/issues/2337/comments
0
2022-12-09T20:12:45Z
2022-12-12T09:59:00Z
https://github.com/gpac/gpac/issues/2337
1,487,390,903
2,337
CVE-2022-47087
2023-01-05T15:15:10.620
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b has a Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2339" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2339
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2339/comments
0
2022-12-10T10:00:27Z
2022-12-12T09:59:01Z
https://github.com/gpac/gpac/issues/2339
1,488,317,476
2,339
CVE-2022-47088
2023-01-05T15:15:10.663
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2340" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2340
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Another Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2340/comments
0
2022-12-10T10:08:12Z
2022-12-12T09:59:02Z
https://github.com/gpac/gpac/issues/2340
1,488,326,210
2,340
CVE-2022-47089
2023-01-05T15:15:10.707
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow via gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2338" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2338/comments
0
2022-12-10T09:54:16Z
2022-12-12T09:59:01Z
https://github.com/gpac/gpac/issues/2338
1,488,308,020
2,338
CVE-2022-47091
2023-01-05T15:15:10.750
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow in gf_text_process_sub function of filters/load_text.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2343" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in gf_text_process_sub function of filters/load_text.c
https://api.github.com/repos/gpac/gpac/issues/2343/comments
0
2022-12-11T13:21:25Z
2022-12-12T09:59:02Z
https://github.com/gpac/gpac/issues/2343
1,489,970,920
2,343
CVE-2022-47092
2023-01-05T15:15:10.793
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is contains an Integer overflow vulnerability in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2347" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Integer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316
https://api.github.com/repos/gpac/gpac/issues/2347/comments
0
2022-12-11T14:02:17Z
2022-12-12T09:59:04Z
https://github.com/gpac/gpac/issues/2347
1,490,026,124
2,347
CVE-2022-47093
2023-01-05T15:15:10.837
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to heap use-after-free via filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2344" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2344
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
heap-use-after-free filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid
https://api.github.com/repos/gpac/gpac/issues/2344/comments
0
2022-12-11T13:29:49Z
2022-12-12T09:59:03Z
https://github.com/gpac/gpac/issues/2344
1,489,981,443
2,344
CVE-2022-47094
2023-01-05T15:15:10.880
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer dereference via filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2345" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2345
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Null pointer dereference filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid
https://api.github.com/repos/gpac/gpac/issues/2345/comments
0
2022-12-11T13:39:08Z
2022-12-12T09:59:03Z
https://github.com/gpac/gpac/issues/2345
1,489,995,127
2,345
CVE-2022-47095
2023-01-05T15:15:10.927
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2346" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2346
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2346/comments
0
2022-12-11T13:53:19Z
2022-12-12T09:59:03Z
https://github.com/gpac/gpac/issues/2346
1,490,015,617
2,346
CVE-2022-47653
2023-01-05T16:15:09.350
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2349" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2349
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in eac3_update_channels function of media_tools/av_parsers.c:9113
https://api.github.com/repos/gpac/gpac/issues/2349/comments
0
2022-12-12T21:08:37Z
2022-12-13T09:18:38Z
https://github.com/gpac/gpac/issues/2349
1,492,772,918
2,349
CVE-2022-47654
2023-01-05T16:15:09.587
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2350" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2350
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261
https://api.github.com/repos/gpac/gpac/issues/2350/comments
0
2022-12-12T21:13:33Z
2022-12-13T09:18:38Z
https://github.com/gpac/gpac/issues/2350
1,492,780,269
2,350
CVE-2022-47655
2023-01-05T16:15:09.803
Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_qpel_fallback<unsigned short>
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/367" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/367
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# Description stack-buffer-overflow (libde265/build/libde265/libde265.so+0x17d304) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file mus...
Another stack-buffer-overflow in function void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/367/comments
3
2022-12-16T09:57:05Z
2023-01-24T16:21:23Z
https://github.com/strukturag/libde265/issues/367
1,499,914,232
367
CVE-2022-47656
2023-01-05T16:15:10.020
GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2353" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2353
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273
https://api.github.com/repos/gpac/gpac/issues/2353/comments
0
2022-12-16T17:03:35Z
2022-12-16T17:36:36Z
https://github.com/gpac/gpac/issues/2353
1,500,560,661
2,353