cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
34
cve_configurations
listlengths
1
5
url
stringlengths
39
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
58
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
39
62
issue_github_id
int64
128M
2.09B
issue_number
int64
1
122k
CVE-2020-22907
2021-07-13T15:15:08.677
Stack overflow vulnerability in function jsi_evalcode_sub in jsish before 3.0.18, allows remote attackers to cause a Denial of Service via a crafted value to the execute parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "F570B531-5AC9-4DD1-AFE7-8C24B969CDF0", "versionEndExcluding": "3.0.18", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/16
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: export JSI__SANITIZE=1 && make test command: ./jsish poc1 ``` # poc: ``` function fail(message) { } function assert(condition, message) { if (!condition) fail(message); } function assertEquals(expression, value, message) { i...
heap overflow
https://api.github.com/repos/pcmacdon/jsish/issues/16/comments
2
2020-05-20T14:49:25Z
2020-05-20T17:01:44Z
https://github.com/pcmacdon/jsish/issues/16
621,824,597
16
CVE-2020-19717
2021-07-13T22:15:08.943
An unhandled memory allocation failure in Core/Ap48bdlAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/416" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/416
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a null pointer dereference caused by unhandled exhaustive memory usage in Ap48bdlAtom.cpp. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined the...
Null pointer dereference caused by unhandled exhaustive memory usage
https://api.github.com/repos/axiomatic-systems/Bento4/issues/416/comments
0
2019-08-09T14:02:54Z
2019-08-25T16:22:18Z
https://github.com/axiomatic-systems/Bento4/issues/416
479,003,776
416
CVE-2020-19718
2021-07-13T22:15:08.967
An unhandled memory allocation failure in Core/Ap4Atom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/417
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a null pointer dereference bug running mp42aac. It is similar to #413. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined then run: ./mp42aac i...
Null pointer dereference bug
https://api.github.com/repos/axiomatic-systems/Bento4/issues/417/comments
0
2019-08-09T14:25:13Z
2019-08-25T16:22:03Z
https://github.com/axiomatic-systems/Bento4/issues/417
479,014,683
417
CVE-2020-19719
2021-07-13T22:15:09.000
A buffer overflow vulnerability in Ap4ElstAtom.cpp of Bento 1.5.1-628 leads to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/414" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/414
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow in Ap4ElstAtom.cpp related to AP4_ElstAtom. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag `DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined` then run: `./mp42aac input /d...
Buffer overflow in Ap4ElstAtom.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/414/comments
0
2019-08-09T12:45:59Z
2019-08-25T16:22:46Z
https://github.com/axiomatic-systems/Bento4/issues/414
478,968,882
414
CVE-2020-19720
2021-07-13T22:15:09.033
An unhandled memory allocation failure in Core/AP4IkmsAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/413" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/413
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow inside AP4_IkmsAtom of AP4IkmsAtom.cpp. It is similar to #412 and #396. ./mp42aac input_file /dev/null In file Source/C++/Core/AP4IkmsAtom.cpp AP4_RtpAtom allocates a new buffer to parse the atom in the stream. The unhandled memory allocation failure causes the read content memcpy to ...
Exhaustive memory usage
https://api.github.com/repos/axiomatic-systems/Bento4/issues/413/comments
0
2019-08-09T12:23:30Z
2019-08-25T16:23:00Z
https://github.com/axiomatic-systems/Bento4/issues/413
478,959,630
413
CVE-2020-19721
2021-07-13T22:15:09.067
A heap buffer overflow vulnerability in Ap4TrunAtom.cpp of Bento 1.5.1-628 may lead to an out-of-bounds write while running mp42aac, leading to system crashes and a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/41...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/415
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a heap buffer overflow in Ap4TrunAtom.cpp when running mp42aac. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag '-DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined' then run: './mp42aac input /...
Heap buffer overflow in Ap4TrunAtom.cpp when running mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/415/comments
0
2019-08-09T13:50:32Z
2019-08-25T16:22:31Z
https://github.com/axiomatic-systems/Bento4/issues/415
478,997,749
415
CVE-2020-19722
2021-07-13T22:15:09.093
An unhandled memory allocation failure in Core/Ap4Atom.cpp of Bento 1.5.1-628 causes a direct copy to NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/418" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/418
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow in Ap4ElstAtom.cpp related to AP4_ElstAtom. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined then run: ./mp42aac input /dev/...
buffer overflow in AP4_NullTerminatedStringAtom
https://api.github.com/repos/axiomatic-systems/Bento4/issues/418/comments
0
2019-08-09T14:41:05Z
2019-08-25T16:21:42Z
https://github.com/axiomatic-systems/Bento4/issues/418
479,022,417
418
CVE-2020-22148
2021-07-21T17:15:08.123
A stored cross site scripting (XSS) vulnerability in /admin.php?page=tags of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1157
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team, I just found a stored XSS in `admin.php?page=tags`. Exploit Request : ``` POST /piwigo/piwigo/admin.php?page=tags HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,im...
Stored Cross Site Scripting in /admin.php?page=tags
https://api.github.com/repos/Piwigo/Piwigo/issues/1157/comments
4
2020-02-12T02:40:57Z
2021-12-07T11:25:00Z
https://github.com/Piwigo/Piwigo/issues/1157
563,700,554
1,157
CVE-2020-22150
2021-07-21T17:15:08.167
A cross site scripting (XSS) vulnerability in /admin.php?page=permalinks of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1158
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team! I found a XSS in XSS in /admin.php?page=permalinks Exploit Request: ``` POST /piwigo/piwigo/admin.php?page=permalinks HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9...
XSS in /admin.php?page=permalinks
https://api.github.com/repos/Piwigo/Piwigo/issues/1158/comments
3
2020-02-12T03:32:27Z
2021-12-07T11:25:28Z
https://github.com/Piwigo/Piwigo/issues/1158
563,727,063
1,158
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1265
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master) due to an invalid read on function gf_m2ts_process_pmt (mpegts.c:2373). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2373 Command: MP4Box -info $PoC ASAN says: ~~~ /home/dungnguyen/gueb-testing/gpac...
Runtime error: left shift of negative value (mpegts.c:2373)
https://api.github.com/repos/gpac/gpac/issues/1265/comments
1
2019-07-05T23:46:25Z
2019-07-07T15:59:07Z
https://github.com/gpac/gpac/issues/1265
464,797,091
1,265
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1266
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2236 Command: MP4Box -info $PoC ASAN says: ~~~ /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3089:23: runtime error: left shift of 12...
Runtime error: left shift of 128 by 24 places cannot be represented in type 'int' (mpegts.c:2236)
https://api.github.com/repos/gpac/gpac/issues/1266/comments
1
2019-07-05T23:46:50Z
2019-07-07T15:58:17Z
https://github.com/gpac/gpac/issues/1266
464,797,129
1,266
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1267
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2541 Command: MP4Box -info $PoC ASAN says: ~~~ Multiple different PAT on single TS found, ignoring new PAT declaration (table id 127 - extended table id...
Runtime error: member access within null pointer of type 'GF_M2TS_ES *[8192]' (mpegts.c:2541)
https://api.github.com/repos/gpac/gpac/issues/1267/comments
1
2019-07-05T23:55:18Z
2019-07-07T15:58:42Z
https://github.com/gpac/gpac/issues/1267
464,797,889
1,267
CVE-2020-19488
2021-07-21T18:15:08.957
An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1263
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit `987169b` on master) due to a null pointer dereference bug on function ilst_item_Read (box_code_apple.c:119). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_npd_ilst_item_Read Command: MP4Box -info $PoC ~~~ [iso file] Read Box type ...
Runtime error: member access within null pointer of type 'struct GF_Box'
https://api.github.com/repos/gpac/gpac/issues/1263/comments
1
2019-07-05T22:47:55Z
2019-07-07T15:57:03Z
https://github.com/gpac/gpac/issues/1263
464,790,539
1,263
CVE-2020-19498
2021-07-21T18:15:09.133
Floating point exception in function Fraction in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libheif:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0C81ED-3820-41B5-8DB0-36E2BC6D993C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/strukturag/libheif/issues/139
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libheif" ]
Hi, I found a FPE bug on the latest commit fd0c01d on master. PoC: https://github.com/strongcourage/PoCs/blob/master/libheif_fd0c01d/PoC_fpe_box.cc:62 Command: examples/heif-info $PoC Valgrind says: ~~~ ==1112== Process terminating with default action of signal 8 (SIGFPE) ==1112== Integer divide by zero at ad...
Floating point exception
https://api.github.com/repos/strukturag/libheif/issues/139/comments
5
2019-07-28T10:14:30Z
2021-07-26T15:05:00Z
https://github.com/strukturag/libheif/issues/139
473,728,085
139
CVE-2020-19499
2021-07-21T18:15:09.167
An issue was discovered in heif::Box_iref::get_references in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impact due to an invalid memory read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libheif:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0C81ED-3820-41B5-8DB0-36E2BC6D993C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/strukturag/libheif/issues/138
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libheif" ]
Hi, I found a bug on the latest commit fd0c01d on master. PoC: https://github.com/strongcourage/PoCs/blob/master/libheif_fd0c01d/PoC_segv_box.cc:2408 Command: examples/heif-convert $PoC /tmp/out.png ASAN says: ~~~ ==16874==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000050 (pc 0x00000048143c bp 0x7...
SEGV in box.cc:2408
https://api.github.com/repos/strukturag/libheif/issues/138/comments
2
2019-07-28T00:11:00Z
2021-07-26T15:04:36Z
https://github.com/strukturag/libheif/issues/138
473,690,024
138
CVE-2020-22352
2021-08-04T21:15:08.033
The gf_dash_segmenter_probe_input function in GPAC v0.8 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
AddressSanitizer: NULL pointer dereference in media_tools/dash_segmenter.c:5264 in gf_dash_segmenter_probe_input
https://api.github.com/repos/gpac/gpac/issues/1423/comments
1
2020-03-01T19:19:26Z
2020-06-11T17:19:33Z
https://github.com/gpac/gpac/issues/1423
573,599,771
1,423
CVE-2020-24829
2021-08-04T21:15:08.077
An issue was discovered in GPAC v0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer overflow in gf_m2ts_section_complete in media_tools/mpegts.c that can cause a denial of service (DOS) via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1422
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
AddressSanitizer: heap-buffer-overflow media_tools/mpegts.c:1471 in gf_m2ts_section_complete
https://api.github.com/repos/gpac/gpac/issues/1422/comments
0
2020-03-01T18:58:01Z
2020-03-06T17:21:35Z
https://github.com/gpac/gpac/issues/1422
573,596,583
1,422
CVE-2021-35306
2021-08-05T20:15:09.387
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the function AP4_StszAtom::WriteFields located in Ap4StszAtom.cpp. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/615" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6BE318-62B8-44AE-9090-BF24EC5E846C", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-636", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/615
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, A SEGV has occurred when running program mp42aac, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0-636 [POC.zip](https://github.com/axiomatic-systems/Bento4/files/6631654/POC.zip) Verification steps: 1.Get the source code of Bento4 2.Compile ``` cd Bento4 mk...
SEGV in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/615/comments
2
2021-06-10T13:16:05Z
2021-12-27T07:29:17Z
https://github.com/axiomatic-systems/Bento4/issues/615
917,334,988
615
CVE-2021-35307
2021-08-05T20:15:09.423
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the AP4_DescriptorFinder::Test component located in /Core/Ap4Descriptor.h. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/616" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6BE318-62B8-44AE-9090-BF24EC5E846C", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-636", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/616
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, A SEGV has occurred when running program mp42aac, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0-636 [poc (2).zip](https://github.com/axiomatic-systems/Bento4/files/6631972/poc.2.zip) Verification steps: 1.Get the source code of Bento4 2.Compile ``` cd Be...
SEGV in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/616/comments
1
2021-06-10T14:10:25Z
2021-08-06T01:09:22Z
https://github.com/axiomatic-systems/Bento4/issues/616
917,392,735
616
CVE-2021-36584
2021-08-05T20:15:09.457
An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1842" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1842
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello, A heap-buffer-overflow has occurred when running program MP4Box,this can reproduce on the lattest commit. System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 [poc1.zip](https://github.com/gpac/gpac/files/6766970/poc1.zip) Verification steps: 1.Get the source code of gpac 2.Compile ...
heap-buffer-overflow in gp_rtp_builder_do_tx3g
https://api.github.com/repos/gpac/gpac/issues/1842/comments
1
2021-07-06T02:59:40Z
2021-08-06T01:08:16Z
https://github.com/gpac/gpac/issues/1842
937,474,838
1,842
CVE-2021-38290
2021-08-09T11:15:07.377
A host header attack vulnerability exists in FUEL CMS 1.5.0 through fuel/modules/fuel/config/fuel_constants.php and fuel/modules/fuel/libraries/Asset.php. An attacker can use a man in the middle attack such as phishing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/commit/8a0d88ad6869623c90e24b3b2ea33352049d39a7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F49387D-17F4-4155-BDDD-65D7770D7E72", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versionS...
https://github.com/daylightstudio/FUEL-CMS/issues/580
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
The system does not verify the host value. If the host value is modified, the link returned by the website will splice the malicious host value。like this: ![微信截图_20210806095405](https://user-images.githubusercontent.com/73220685/128444240-f352c4c8-c884-4894-b0e8-10fa2d687051.png) ![微信截图_20210806095532](https://user-i...
Host header attack vulnerability exists in fuel CMS 1.5.0. An attacker can use man in the middle attack to attack users such as phishing.
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/580/comments
0
2021-08-06T01:58:06Z
2021-08-10T17:49:48Z
https://github.com/daylightstudio/FUEL-CMS/issues/580
962,327,274
580
CVE-2021-32437
2021-08-11T20:15:08.933
The gf_hinter_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1653f31cf874eb6df964bea88d58d8e9b98b485e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1770
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A null pointer dereference issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-debug ``` run poc file : ``` ./bin/gcc/MP4Box -hint poc -out /dev/null ``` Detailed ASAN res...
Null pointer dereference in function gf_hinter_finalize isom_hinter.c:1236
https://api.github.com/repos/gpac/gpac/issues/1770/comments
1
2021-04-30T08:10:59Z
2021-08-11T02:23:20Z
https://github.com/gpac/gpac/issues/1770
872,144,270
1,770
CVE-2021-32438
2021-08-11T20:15:08.977
The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1769
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A null pointer dereference issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-debug ``` run poc file : ``` ./bin/gcc/MP4Box -nhnt 1 poc -out /dev/null ``` Detailed AS...
Null pointer dereference in gpac MP4Box gf_media_export_filters
https://api.github.com/repos/gpac/gpac/issues/1769/comments
1
2021-04-30T08:03:06Z
2021-08-11T02:27:58Z
https://github.com/gpac/gpac/issues/1769
872,138,105
1,769
CVE-2021-32439
2021-08-11T20:15:09.013
Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/77ed81c069e10b3861d88f72e1c6be1277ee7eae" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1774
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A OOB Write issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-debug ``` run poc file : ``` ./bin/gcc/MP4Box -hint poc -out /dev/null ``` Detailed ASAN result is as below...
Out of bounds Write in stbl_write.c:1650
https://api.github.com/repos/gpac/gpac/issues/1774/comments
1
2021-04-30T08:40:50Z
2021-08-11T02:30:18Z
https://github.com/gpac/gpac/issues/1774
872,168,928
1,774
CVE-2021-32440
2021-08-11T20:15:09.047
The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/f0ba83717b6e4d7a15a1676d1fe06152e199b011" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1772
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A SEGV issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-debug ``` run poc file : ``` ./bin/gcc/MP4Box -hint poc -out /dev/null ``` Detailed ASAN result is as below: ``...
SEGV in gpac MP4Box function Media_RewriteODFrame
https://api.github.com/repos/gpac/gpac/issues/1772/comments
1
2021-04-30T08:25:12Z
2021-08-11T02:31:04Z
https://github.com/gpac/gpac/issues/1772
872,155,736
1,772
CVE-2020-21066
2021-08-13T21:15:06.923
An issue was discovered in Bento4 v1.5.1.0. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a denial of service (program crash), as demonstrated by mp42aac.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/408" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/408
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# bento4 ## version bento4 1.5.1.0 ## description ```txt mp42acc 1.0 ``` ## download link https://www.bento4.com/ ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## (1) AP4_BitReader::SkipBits@Ap4Utils.cpp-548___heap-...
2 Potential Buffer Overflow Vulnerabilities
https://api.github.com/repos/axiomatic-systems/Bento4/issues/408/comments
0
2019-07-19T06:39:22Z
2019-08-25T16:24:15Z
https://github.com/axiomatic-systems/Bento4/issues/408
470,163,532
408
CVE-2020-23330
2021-08-17T22:15:07.823
An issue was discovered in Bento4 version 06c39d9. A NULL pointer dereference exists in the AP4_Stz2Atom::GetSampleSize component located in /Core/Ap4Stz2Atom.cpp. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/511" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "89DEDC3E-CD07-448B-BFC4-105F86368918", "versionEndExcluding": "1.6.0-635", "versionEndIncluding": null, "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/511
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Command: ./mp42aac @@ /tmp/out.aac # Information provided by address sanitizer AddressSanitizer:DEADLYSIGNAL ================================================================= ==22974==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000068223f bp 0x7ffedd403b10 sp 0x7ffedd403970 T0) ==...
SEGV by a READ memory access (address points to the zero page)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/511/comments
1
2020-05-16T12:08:52Z
2020-05-22T00:41:45Z
https://github.com/axiomatic-systems/Bento4/issues/511
619,458,135
511
CVE-2020-23331
2021-08-17T22:15:07.867
An issue was discovered in Bento4 version 06c39d9. A NULL pointer dereference exists in the AP4_DescriptorListWriter::Action component located in /Core/Ap4Descriptor.h. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/509" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F13899-4DE7-4BC0-8E7F-8795F58AA99F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/axiomatic-systems/Bento4/issues/509
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Command line: ./mp42aac @@ /tmp/out.aac # Information provided by crashwalk: ---CRASH SUMMARY--- Filename: psym-crashes/id:000544,sig:11,src:001515+007343,op:splice,rep:2 SHA1: 20de771b6086b1a3398115e4e2fc2841d0e50b64 Classification: PROBABLY_NOT_EXPLOITABLE Hash: f580ca995a6ddc20b994fa723585917b.571d196dd...
SEGV by a READ memory access in AP4_DecoderConfigDescriptor::WriteFields
https://api.github.com/repos/axiomatic-systems/Bento4/issues/509/comments
1
2020-05-16T11:29:41Z
2020-05-18T06:12:29Z
https://github.com/axiomatic-systems/Bento4/issues/509
619,450,232
509
CVE-2020-23332
2021-08-17T22:15:07.903
A heap-based buffer overflow exists in the AP4_StdcFileByteStream::ReadPartial component located in /StdC/Ap4StdCFileByteStream.cpp of Bento4 version 06c39d9. This issue can lead to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F13899-4DE7-4BC0-8E7F-8795F58AA99F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/axiomatic-systems/Bento4/issues/510
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Command: ./mp42aac @@ /tmp/out.aac # Information provided by address sanitizer: ================================================================= ==22589==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000b1 at pc 0x0000004e57a0 bp 0x7ffddd2a7340 sp 0x7ffddd2a6af0 WRITE of size 439 at 0x6...
Heap buffer overflow in AP4_StdcFileByteStream::ReadPartial
https://api.github.com/repos/axiomatic-systems/Bento4/issues/510/comments
1
2020-05-16T11:33:57Z
2020-05-18T06:14:32Z
https://github.com/axiomatic-systems/Bento4/issues/510
619,451,101
510
CVE-2020-23333
2021-08-17T22:15:07.940
A heap-based buffer overflow exists in the AP4_CttsAtom::AP4_CttsAtom component located in /Core/Ap4Utils.h of Bento4 version 06c39d9. This can lead to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/507" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "89DEDC3E-CD07-448B-BFC4-105F86368918", "versionEndExcluding": "1.6.0-635", "versionEndIncluding": null, "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/507
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
I use my fuzzing project framework to find some vulnerabilities in mp42aac with command line: mp42aac @@ /tmp/out.aac I found a heap buffer overflow in AP4_CttsAtom::AP4_CttsAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&). # Information provided by address sanitizer ==============================...
Heap buffer overflow in AP4_CttsAtom::AP4_CttsAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/507/comments
2
2020-05-16T07:46:13Z
2020-05-22T00:41:43Z
https://github.com/axiomatic-systems/Bento4/issues/507
619,406,496
507
CVE-2020-23334
2021-08-17T22:15:07.973
A WRITE memory access in the AP4_NullTerminatedStringAtom::AP4_NullTerminatedStringAtom component of Bento4 version 06c39d9 can lead to a segmentation fault.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/508" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "89DEDC3E-CD07-448B-BFC4-105F86368918", "versionEndExcluding": "1.6.0-635", "versionEndIncluding": null, "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/508
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
I found a crash by running "./mp42aac @@ /tmp/out.aac". The crash is identified as "EXPLOITABLE" by crashwalk. # Information provided by crashwalk (!exploitable) ---CRASH SUMMARY--- Filename: id:000436,sig:11,src:005777,op:ext_AO,pos:697 SHA1: 6e5f8913397067951eb2e963701fd605b3bc168b Classification: EXPLOITAB...
SEGV on unknown address by a WRITE memory access in AP4_NullTerminatedStringAtom::AP4_NullTerminatedStringAtom(unsigned int, unsigned long long, AP4_ByteStream&)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/508/comments
1
2020-05-16T07:59:15Z
2020-05-22T00:41:44Z
https://github.com/axiomatic-systems/Bento4/issues/508
619,408,633
508
CVE-2018-10790
2021-08-25T14:15:07.017
The AP4_CttsAtom class in Core/Ap4CttsAtom.cpp in Bento4 1.5.1.0 allows remote attackers to cause a denial of service (application crash), related to a memory allocation failure, as demonstrated by mp2aac.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://docs.google.com/document/d/1OSwQjtyALgV3OulmWGaTqZrSzk7Ta-xGrcLI0I7SPyM" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/390
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
cmd: `mp42hls $poc` poc can download [here](https://github.com/lvtao-sec/Pocs/raw/master/bento4-integer-overflow) version: master head vuln type: integer and buffer overflow There is an integer overflow at `Source/C++/Core/Ap4CttsAtom.cpp:80` , which then causes an buffer overflow read bugs at `Source/C++/Core/A...
Integer overflow at Source/C++/Core/Ap4CttsAtom.cpp:80 and buffer overflow at Source/C++/Core/Ap4CttsAtom.cpp:89
https://api.github.com/repos/axiomatic-systems/Bento4/issues/390/comments
0
2019-04-26T13:44:32Z
2019-04-26T13:44:32Z
https://github.com/axiomatic-systems/Bento4/issues/390
437,680,361
390
CVE-2021-36530
2021-08-27T16:15:07.210
ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/miniupnp/ngiflib/issues/19
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
Similar to #18, this Overflow problem is because in NGIFLIB_NO_FILE mode, `GetByteStr()` copy memory buffer without checking the boundary. ## Test Environment Ubuntu 16.04, 64bit ngiflib(master 0245fd4) ## How to trigger 1. Compile the program with AddressSanitizer in NGIFLIB_NO_FILE mode `CC="clang -fsaniti...
AddressSanitizer: heap-buffer-overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode
https://api.github.com/repos/miniupnp/ngiflib/issues/19/comments
1
2021-06-30T02:36:51Z
2021-08-11T13:46:24Z
https://github.com/miniupnp/ngiflib/issues/19
933,250,873
19
CVE-2021-36531
2021-08-27T16:15:07.340
ngiflib 0.4 has a heap overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode, GetByte() reads memory buffer without checking the boundary.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/miniupnp/ngiflib/issues/18
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
This Overflow problem is because in NGIFLIB_NO_FILE mode, `GetByte()` reads memory buffer without checking the boundary. ## Test Environment Ubuntu 16.04, 64bit ngiflib(master 0245fd4) ## How to trigger 1. Compile the program with AddressSanitizer in NGIFLIB_NO_FILE mode `CC="clang -fsanitize=address -g" CFLAG...
AddressSanitizer: heap-buffer-overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode
https://api.github.com/repos/miniupnp/ngiflib/issues/18/comments
0
2021-06-30T02:34:21Z
2021-08-11T13:44:23Z
https://github.com/miniupnp/ngiflib/issues/18
933,250,010
18
CVE-2021-25735
2021-09-06T12:15:07.617
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating A...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/100096" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CBC03B5-FF1D-45D7-A8F9-288DF2057568", "versionEndExcluding": "1.18.18", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/100096
[ "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. You are only affected by this vulnerability if you run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. This issue has ...
CVE-2021-25735: Validating Admission Webhook does not observe some previous fields
https://api.github.com/repos/kubernetes/kubernetes/issues/100096/comments
6
2021-03-10T18:18:01Z
2021-12-02T22:53:35Z
https://github.com/kubernetes/kubernetes/issues/100096
828,149,421
100,096
CVE-2021-25737
2021-09-06T12:15:07.673
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTI...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/102106" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B86E916-8D46-49BD-BF24-ED83D2ECFB28", "versionEndExcluding": "1.18.19", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/102106
[ "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
#### Issue Details A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs. This issue has be...
CVE-2021-25737: Holes in EndpointSlice Validation Enable Host Network Hijack
https://api.github.com/repos/kubernetes/kubernetes/issues/102106/comments
4
2021-05-18T19:14:27Z
2022-04-19T20:52:27Z
https://github.com/kubernetes/kubernetes/issues/102106
894,695,650
102,106
CVE-2020-19750
2021-09-07T20:15:07.383
An issue was discovered in gpac 0.8.0. The strdup function in box_code_base.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1262
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ] I give enough info...
in box_code_base.c line 8637 has a heap overflow
https://api.github.com/repos/gpac/gpac/issues/1262/comments
2
2019-07-05T09:50:55Z
2021-09-09T19:34:38Z
https://github.com/gpac/gpac/issues/1262
464,559,871
1,262
CVE-2020-19751
2021-09-07T20:15:07.443
An issue was discovered in gpac 0.8.0. The gf_odf_del_ipmp_tool function in odf_code.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1272
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [✔ ] I looked for a similar issue and couldn't find any. - [✔ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ✔] I give enough i...
in odf_code.c line3295 have a heap-buffer-overflow
https://api.github.com/repos/gpac/gpac/issues/1272/comments
1
2019-07-08T12:35:13Z
2019-07-09T16:32:53Z
https://github.com/gpac/gpac/issues/1272
465,232,934
1,272
CVE-2021-38721
2021-09-09T15:15:09.363
FUEL CMS 1.5.0 login.php contains a cross-site request forgery (CSRF) vulnerability
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/commit/6164cd794674d4d74da39f8b535ff588ab006e33" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "824FE41F-1596-45D3-8949-AC4C9CC02949", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/584
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Because my mailbox function is not configured, it cannot be fully demonstrated. There is a CSRF vulnerability in the password modification page. http://website/fuel/index.php/fuel/login/pwd_reset ![image](https://user-images.githubusercontent.com/73220685/128794851-222e2b65-7bd3-454b-9893-f9ecf5b595ec.png) csrf ...
FUEL CMS 1.5.0 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/584/comments
1
2021-08-10T01:37:40Z
2021-08-19T02:06:08Z
https://github.com/daylightstudio/FUEL-CMS/issues/584
964,516,513
584
CVE-2021-38723
2021-09-09T15:15:09.427
FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/pages/items
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/583" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "824FE41F-1596-45D3-8949-AC4C9CC02949", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/583
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
![image](https://user-images.githubusercontent.com/73220685/128794296-1a6f4a48-34fa-4fc9-89f7-84e19f68b5c3.png) ``` GET /fuel/index.php/fuel/pages/items?search=Search&col=(select(0)from(select(sleep(0)))v)&fuel_inline=0&layout=&limit=50&offset=0&order=asc&published=yes&search_term=&view_type=list HTTP/1.1 X-Requeste...
FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/pages/items
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/583/comments
0
2021-08-10T01:26:43Z
2021-08-10T01:27:55Z
https://github.com/daylightstudio/FUEL-CMS/issues/583
964,512,685
583
CVE-2021-38725
2021-09-09T15:15:09.470
Fuel CMS 1.5.0 has a brute force vulnerability in fuel/modules/fuel/controllers/Login.php
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/commit/15934fdd309408640d1f2be18f93a8beadaa5e9b" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "824FE41F-1596-45D3-8949-AC4C9CC02949", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/581
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
IN the forgot password page. Because there is no limit on the number of times, An attacker can brute crack the email address of the administrator. ![image](https://user-images.githubusercontent.com/73220685/128656387-1bd9e745-f284-427a-be0a-5d5769bfb789.png) ![image](https://user-images.githubusercontent.com/73220685...
Fuel CMS 1.5.0 has a brute force vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/581/comments
0
2021-08-09T03:09:21Z
2021-08-10T17:49:37Z
https://github.com/daylightstudio/FUEL-CMS/issues/581
963,603,502
581
CVE-2021-38727
2021-09-09T16:15:09.010
FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/logs/items
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/582" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://streamable.com/lxw3ln" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "824FE41F-1596-45D3-8949-AC4C9CC02949", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/582
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
![image](https://user-images.githubusercontent.com/73220685/128793886-fa388400-befb-4b1e-9e5c-62ea6bfeedd2.png) ![image](https://user-images.githubusercontent.com/73220685/128793891-18f0ba23-0d81-4bce-9749-3f49bbc41408.png) ``` GET /fuel/index.php/fuel/logs/items?search=Search&col=(select(0)from(select(sleep(5)))v...
FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/logs/items
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/582/comments
1
2021-08-10T01:22:52Z
2021-10-29T19:32:43Z
https://github.com/daylightstudio/FUEL-CMS/issues/582
964,511,369
582
CVE-2021-32136
2021-09-13T13:15:07.360
Heap buffer overflow in the print_udta function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/eb71812fcc10e9c5348a5d1c61bd25b6fa06eaed" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1765
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]heap buffer overlow in MP4Box print_udta
https://api.github.com/repos/gpac/gpac/issues/1765/comments
0
2021-04-30T00:42:12Z
2023-09-22T06:10:39Z
https://github.com/gpac/gpac/issues/1765
871,724,292
1,765
CVE-2021-32134
2021-09-13T14:15:07.720
The gf_odf_desc_copy function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/328c6d682698fdb9878dbb4f282963d42c538c01" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1756
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box gf_odf_desc_copy
https://api.github.com/repos/gpac/gpac/issues/1756/comments
0
2021-04-23T00:50:46Z
2023-09-22T06:13:46Z
https://github.com/gpac/gpac/issues/1756
865,638,887
1,756
CVE-2021-32137
2021-09-13T14:15:09.640
Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/328def7d3b93847d64ecb6e9e0399684e57c3eca" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1766
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]heap buffer overflow in MP4Box URL_GetProtocolType
https://api.github.com/repos/gpac/gpac/issues/1766/comments
0
2021-04-30T00:43:52Z
2023-09-22T06:09:59Z
https://github.com/gpac/gpac/issues/1766
871,726,037
1,766
CVE-2021-32132
2021-09-13T15:15:24.477
The abst_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/e74be5976a6fee059c638050a237893f7e9a3b23" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1753
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference issue in MP4Box abst_box_size
https://api.github.com/repos/gpac/gpac/issues/1753/comments
0
2021-04-22T08:05:19Z
2023-09-22T06:10:25Z
https://github.com/gpac/gpac/issues/1753
864,665,765
1,753
CVE-2021-32135
2021-09-13T15:15:24.577
The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1757
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box trak_box_size
https://api.github.com/repos/gpac/gpac/issues/1757/comments
0
2021-04-23T00:51:46Z
2023-09-22T06:08:04Z
https://github.com/gpac/gpac/issues/1757
865,639,263
1,757
CVE-2021-33362
2021-09-13T19:15:12.257
Stack buffer overflow in the hevc_parse_vps_extension function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1273cdc706eeedf8346d4b9faa5b33435056061d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1780
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]stack overflow(oob) in MP4Box
https://api.github.com/repos/gpac/gpac/issues/1780/comments
0
2021-05-08T05:09:01Z
2023-09-22T06:14:24Z
https://github.com/gpac/gpac/issues/1780
880,291,127
1,780
CVE-2021-33364
2021-09-13T19:15:13.987
Memory leak in the def_parent_box_new function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/fe5155cf047252d1c4cb91602048bfa682af0ea7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1783
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box def_parent_box_new
https://api.github.com/repos/gpac/gpac/issues/1783/comments
0
2021-05-08T05:13:43Z
2023-09-22T06:07:11Z
https://github.com/gpac/gpac/issues/1783
880,295,889
1,783
CVE-2021-33366
2021-09-13T19:15:14.587
Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/0a85029d694f992f3631e2f249e4999daee15cbf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1785
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box gf_isom_oinf_read_entry
https://api.github.com/repos/gpac/gpac/issues/1785/comments
0
2021-05-08T05:15:54Z
2023-09-22T06:07:35Z
https://github.com/gpac/gpac/issues/1785
880,298,140
1,785
CVE-2021-32138
2021-09-13T20:15:08.343
The DumpTrackInfo function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/289ffce3e0d224d314f5f92a744d5fe35999f20b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1767
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box DumpTrackInfo
https://api.github.com/repos/gpac/gpac/issues/1767/comments
0
2021-04-30T00:45:19Z
2023-09-22T06:12:11Z
https://github.com/gpac/gpac/issues/1767
871,728,422
1,767
CVE-2021-32139
2021-09-13T20:15:08.453
The gf_isom_vp_config_get function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/d527325a9b72218612455a534a508f9e1753f76e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1768
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in gpac MP4Box gf_isom_vp_config_get
https://api.github.com/repos/gpac/gpac/issues/1768/comments
0
2021-04-30T00:46:26Z
2023-09-22T06:06:39Z
https://github.com/gpac/gpac/issues/1768
871,729,530
1,768
CVE-2021-33361
2021-09-13T20:15:08.510
Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1782
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box afra_box_read
https://api.github.com/repos/gpac/gpac/issues/1782/comments
0
2021-05-08T05:12:31Z
2023-09-22T06:09:46Z
https://github.com/gpac/gpac/issues/1782
880,294,671
1,782
CVE-2021-33363
2021-09-13T20:15:08.567
Memory leak in the infe_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ec64c7b8966d7e4642d12debb888be5acf18efb9" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1786
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box infe_box_read
https://api.github.com/repos/gpac/gpac/issues/1786/comments
0
2021-05-08T05:17:05Z
2023-09-22T06:13:34Z
https://github.com/gpac/gpac/issues/1786
880,299,345
1,786
CVE-2021-33365
2021-09-13T20:15:08.627
Memory leak in the gf_isom_get_root_od function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/984787de3d414a5f7d43d0b4584d9469dff2a5a5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1784
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box gf_isom_get_root_od
https://api.github.com/repos/gpac/gpac/issues/1784/comments
0
2021-05-08T05:14:42Z
2023-09-22T06:08:59Z
https://github.com/gpac/gpac/issues/1784
880,296,904
1,784
CVE-2020-21594
2021-09-16T22:15:07.587
libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/233" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/233
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_epel_hv_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16....
heap-buffer-overflow in put_epel_hv_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/233/comments
4
2019-12-24T08:25:45Z
2023-01-24T17:42:58Z
https://github.com/strukturag/libde265/issues/233
542,042,456
233
CVE-2020-21595
2021-09-16T22:15:07.697
libde265 v1.0.4 contains a heap buffer overflow in the mc_luma function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/239" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/239
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in mc_luma when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Rel...
heap-buffer-overflow in mc_luma when decoding file
https://api.github.com/repos/strukturag/libde265/issues/239/comments
2
2019-12-24T11:28:20Z
2023-01-24T18:06:05Z
https://github.com/strukturag/libde265/issues/239
542,098,946
239
CVE-2020-21596
2021-09-16T22:15:07.743
libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/236" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/236
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# global buffer overflow in decode_CABAC_bit when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04...
global buffer overflow in decode_CABAC_bit when decoding file
https://api.github.com/repos/strukturag/libde265/issues/236/comments
2
2019-12-24T11:22:38Z
2023-01-24T18:01:46Z
https://github.com/strukturag/libde265/issues/236
542,097,369
236
CVE-2020-21597
2021-09-16T22:15:07.793
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/238" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/238
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in mc_chroma when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS R...
heap-buffer-overflow in mc_chroma when decoding file
https://api.github.com/repos/strukturag/libde265/issues/238/comments
4
2019-12-24T11:26:58Z
2023-01-24T18:04:53Z
https://github.com/strukturag/libde265/issues/238
542,098,570
238
CVE-2020-21598
2021-09-16T22:15:07.837
libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unweighted_pred_8_sse function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/237
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file
https://api.github.com/repos/strukturag/libde265/issues/237/comments
3
2019-12-24T11:25:26Z
2023-01-24T18:03:54Z
https://github.com/strukturag/libde265/issues/237
542,098,137
237
CVE-2020-21599
2021-09-16T22:15:07.880
libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/235" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/235
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
# heap overflow in de265_image::available_zscan when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16...
heap overflow in de265_image::available_zscan when decoding file
https://api.github.com/repos/strukturag/libde265/issues/235/comments
4
2019-12-24T11:18:40Z
2023-01-24T17:46:14Z
https://github.com/strukturag/libde265/issues/235
542,096,202
235
CVE-2020-21600
2021-09-16T22:15:07.920
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pred_avg_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/struktura...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/243
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_weighted_pred_avg_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in put_weighted_pred_avg_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/243/comments
4
2019-12-24T11:35:38Z
2023-01-24T18:10:24Z
https://github.com/strukturag/libde265/issues/243
542,100,957
243
CVE-2020-21601
2021-09-16T22:15:07.963
libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/241" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/241
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# stack-buffer-overflow in put_qpel_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04...
stack-buffer-overflow in put_qpel_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/241/comments
3
2019-12-24T11:32:05Z
2023-01-24T18:08:34Z
https://github.com/strukturag/libde265/issues/241
542,100,005
241
CVE-2020-21602
2021-09-16T22:15:08.007
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bipred_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/struktura...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_weighted_bipred_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in put_weighted_bipred_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/242/comments
2
2019-12-24T11:33:52Z
2023-01-24T18:09:22Z
https://github.com/strukturag/libde265/issues/242
542,100,475
242
CVE-2020-21603
2021-09-16T22:15:08.050
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/240" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/240
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_qpel_0_0_fallback_16 when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu...
heap-buffer-overflow in put_qpel_0_0_fallback_16 when decoding file
https://api.github.com/repos/strukturag/libde265/issues/240/comments
3
2019-12-24T11:29:40Z
2023-01-24T18:07:17Z
https://github.com/strukturag/libde265/issues/240
542,099,323
240
CVE-2020-21604
2021-09-16T22:15:08.093
libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl_epi64 function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/231" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/231
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in decode file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16...
heap-buffer-overflow in decode file
https://api.github.com/repos/strukturag/libde265/issues/231/comments
3
2019-12-24T03:25:24Z
2023-01-24T17:40:29Z
https://github.com/strukturag/libde265/issues/231
541,973,882
231
CVE-2020-21605
2021-09-16T22:15:08.133
libde265 v1.0.4 contains a segmentation fault in the apply_sao_internal function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/234" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/234
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# segment fault in apply_sao_internal when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS ...
segment fault in apply_sao_internal when decoding file
https://api.github.com/repos/strukturag/libde265/issues/234/comments
3
2019-12-24T11:14:43Z
2023-01-24T17:45:28Z
https://github.com/strukturag/libde265/issues/234
542,094,959
234
CVE-2020-21606
2021-09-16T22:15:08.177
libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/232" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/232
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_epel_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16....
heap-buffer-overflow in put_epel_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/232/comments
5
2019-12-24T08:22:59Z
2023-01-24T17:39:38Z
https://github.com/strukturag/libde265/issues/232
542,041,601
232
CVE-2021-32265
2021-09-20T16:15:09.913
An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::WritePartial() located in Ap4ByteStream.cpp. It allows an attacker to cause code execution or information disclosure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/545" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "9684D8EA-E280-40A0-BB75-E7AFB950B234", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-637", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/545
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## System info Ubuntu x86_64, clang 6.0, mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=add...
A global-buffer-overflow in Ap4ByteStream.cpp:783:5
https://api.github.com/repos/axiomatic-systems/Bento4/issues/545/comments
1
2020-08-22T01:47:18Z
2022-05-01T20:31:46Z
https://github.com/axiomatic-systems/Bento4/issues/545
683,904,034
545
CVE-2021-32268
2021-09-20T16:15:09.960
Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary code. The fixed version is 1.0.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1587
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A heap-buffer-overflow in box_dump.c:350
https://api.github.com/repos/gpac/gpac/issues/1587/comments
0
2020-09-04T15:05:21Z
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1587
693,270,293
1,587
CVE-2021-32269
2021-09-20T16:15:10.003
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1574" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1574
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in box_dump.c:3641
https://api.github.com/repos/gpac/gpac/issues/1574/comments
0
2020-08-13T03:20:26Z
2020-09-01T16:00:16Z
https://github.com/gpac/gpac/issues/1574
678,118,496
1,574
CVE-2021-32270
2021-09-20T16:15:10.053
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in box_code_base.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1586" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1586
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in box_code_base.c:11579
https://api.github.com/repos/gpac/gpac/issues/1586/comments
0
2020-09-04T14:58:11Z
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1586
693,262,344
1,586
CVE-2021-32271
2021-09-20T16:15:10.100
An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in odf_dump.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1575" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1575
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A stack-buffer-overflow in odf_dump.c:887
https://api.github.com/repos/gpac/gpac/issues/1575/comments
0
2020-08-15T01:36:37Z
2020-09-01T16:03:15Z
https://github.com/gpac/gpac/issues/1575
679,475,781
1,575
CVE-2021-39521
2021-09-20T16:15:11.857
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/262" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/262
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [bacd017](https://github.com/LibreDWG/libredwg/commit/bacd01778d20b7b79f28541ea7a60cafe25175aa)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./SE...
A Segmentation fault in bits.c:186
https://api.github.com/repos/LibreDWG/libredwg/issues/262/comments
2
2020-08-03T14:19:33Z
2020-08-04T09:51:29Z
https://github.com/LibreDWG/libredwg/issues/262
672,111,174
262
CVE-2021-39522
2021-09-20T16:15:11.900
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2len() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/255" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/255
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./h...
A heap buffer overflow in bit_wcs2len at bits.c:1634
https://api.github.com/repos/LibreDWG/libredwg/issues/255/comments
1
2020-07-31T12:13:06Z
2020-08-01T09:34:29Z
https://github.com/LibreDWG/libredwg/issues/255
669,753,229
255
CVE-2021-39523
2021-09-20T16:15:11.947
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function check_POLYLINE_handles() located in decode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/251" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/251
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info: Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Command line ./programs/dwg2dxf -b -m ./SEGV-check_POLYLINE_handles-decode-5110 -o /dev/null ## Output ``` Reading DWG file ./...
A Segmentation fault error in check_POLYLINE_handles at decode.c:5110
https://api.github.com/repos/LibreDWG/libredwg/issues/251/comments
0
2020-07-31T08:53:01Z
2020-08-01T09:34:28Z
https://github.com/LibreDWG/libredwg/issues/251
669,581,382
251
CVE-2021-39525
2021-09-20T16:15:11.990
An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/261" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/261
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [39ef943](https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./...
A heap overflow in bits.c:1424
https://api.github.com/repos/LibreDWG/libredwg/issues/261/comments
1
2020-08-02T04:51:37Z
2020-08-02T12:15:30Z
https://github.com/LibreDWG/libredwg/issues/261
671,508,299
261
CVE-2021-39527
2021-09-20T16:15:12.037
An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/252
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info: Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Command line ./programs/dwg2dxf -b -m ./heap-buffer-overflow-appinfo_private-decode-2993 -o /dev/null ## AddressSanitizer output ...
A heap buffer overflow in appinfo_private at decode.c:2993
https://api.github.com/repos/LibreDWG/libredwg/issues/252/comments
0
2020-07-31T08:58:03Z
2020-08-01T09:34:29Z
https://github.com/LibreDWG/libredwg/issues/252
669,586,008
252
CVE-2021-39528
2021-09-20T16:15:12.077
An issue was discovered in libredwg through v0.10.1.3751. dwg_free_MATERIAL_private() in dwg.spec has a double free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/256" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/256
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwgbmp (latest master [4b99ed](https://github.com/LibreDWG/libredwg/commit/4b99edb0ea26e99ef65c5fe68670e6b1f9382d44)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwgbmp ./double-fr...
A double free in dwg.spec:7662
https://api.github.com/repos/LibreDWG/libredwg/issues/256/comments
1
2020-08-01T12:56:26Z
2020-08-01T21:07:33Z
https://github.com/LibreDWG/libredwg/issues/256
670,848,928
256
CVE-2021-39530
2021-09-20T16:15:12.163
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/258" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/258
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwgbmp (latest master [39ef943](https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwgbmp ./heap-ove...
Heap overflow due to incomplete fix for issues #255
https://api.github.com/repos/LibreDWG/libredwg/issues/258/comments
0
2020-08-02T02:25:59Z
2020-08-02T12:15:29Z
https://github.com/LibreDWG/libredwg/issues/258
671,412,127
258
CVE-2021-39553
2021-09-20T16:15:13.187
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function grealloc() located in gmem.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://github.com/matthiaskramm/swftools/issues/103" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/103
[ "Exploit", "Issue Tracking", "Technical Description" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-grealloc-gmem-156 ## Output ``` Error: PDF file is damaged -...
A Segmentation fault in xpdf/gmem.cc:156
https://api.github.com/repos/swftools/swftools/issues/103/comments
0
2020-08-01T06:55:27Z
2020-08-01T06:55:27Z
https://github.com/swftools/swftools/issues/103
670,596,306
103
CVE-2021-39554
2021-09-20T16:15:13.227
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function Lexer::Lexer() located in Lexer.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/100" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/100
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-Lexer-Lexer-53 ## Output ``` Segmentation fault (core dumped...
A Segmentation fault in xpdf/Lexer.cc:53
https://api.github.com/repos/swftools/swftools/issues/100/comments
0
2020-08-01T02:16:31Z
2020-08-01T02:16:31Z
https://github.com/swftools/swftools/issues/100
670,435,303
100
CVE-2021-39555
2021-09-20T16:15:13.270
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D0() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/99" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/99
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-type3D0-InfoOutputDev-880 ## Output ``` Segmentation fault (core dumpe...
A Segmentation fault in InfoOutputDev.cc:880
https://api.github.com/repos/swftools/swftools/issues/99/comments
0
2020-08-01T02:10:19Z
2020-08-01T02:10:19Z
https://github.com/swftools/swftools/issues/99
670,432,001
99
CVE-2021-39556
2021-09-20T16:15:13.313
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D1() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/105" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/105
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-type3D1-InfoOutputDev-887 ## Output ``` Segmentation fault (core dumpe...
A Segmentation fault in InfoOutputDev.cc:887
https://api.github.com/repos/swftools/swftools/issues/105/comments
0
2020-08-01T07:01:24Z
2020-08-01T07:01:24Z
https://github.com/swftools/swftools/issues/105
670,599,501
105
CVE-2021-39557
2021-09-20T16:15:13.357
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function copyString() located in gmem.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/97" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/97
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-gmalloc-gmem-101 ## Output ``` Segmentation fault (core dump...
Segmentation fault error in xpdf/gmem.cc:101
https://api.github.com/repos/swftools/swftools/issues/97/comments
0
2020-07-31T14:00:06Z
2020-08-01T02:37:17Z
https://github.com/swftools/swftools/issues/97
669,847,515
97
CVE-2021-39558
2021-09-20T16:15:13.397
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function VectorGraphicOutputDev::drawGeneralImage() located in VectorGraphicOutputDev.cc. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/106" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/106
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-drawGeneralImage-VectorGraphicOutputDev-1158 ## AddressSanitizer...
A stack-buffer-overflow in VectorGraphicOutputDev.cc:1158
https://api.github.com/repos/swftools/swftools/issues/106/comments
0
2020-08-02T03:17:40Z
2020-08-02T03:17:40Z
https://github.com/swftools/swftools/issues/106
671,446,394
106
CVE-2021-39559
2021-09-20T16:15:13.440
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function GString::~GString() located in GString.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/101
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-GString-GString-173 ## AddressSanitizer output ``` Error: Type 4 funct...
A SEGV in xpdf/GString.cc:173
https://api.github.com/repos/swftools/swftools/issues/101/comments
0
2020-08-01T02:18:46Z
2020-08-01T02:18:46Z
https://github.com/swftools/swftools/issues/101
670,436,539
101
CVE-2021-39561
2021-09-20T16:15:13.480
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/102" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/102
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ## AddressSanitizer output ``` Error (492): Unknown operator 'P0' ==========...
A stack overflow in xpdf/Gfx.cc:1258
https://api.github.com/repos/swftools/swftools/issues/102/comments
0
2020-08-01T02:31:55Z
2020-08-01T02:31:55Z
https://github.com/swftools/swftools/issues/102
670,444,172
102
CVE-2021-39562
2021-09-20T16:15:13.527
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function FileStream::makeSubStream() located in Stream.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/98" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/98
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-Stream-598 ## Output ``` Segmentation fault (core dumped) `...
A Segmentation fault in xpdf/Stream.cc:598
https://api.github.com/repos/swftools/swftools/issues/98/comments
0
2020-08-01T02:04:36Z
2020-08-01T02:06:51Z
https://github.com/swftools/swftools/issues/98
670,428,844
98
CVE-2021-39563
2021-09-20T16:15:13.567
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/115" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/115
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ...
A Segmentation fault in swfaction.c:483
https://api.github.com/repos/swftools/swftools/issues/115/comments
0
2020-08-05T07:02:23Z
2020-08-05T07:09:34Z
https://github.com/swftools/swftools/issues/115
673,305,336
115
CVE-2021-39564
2021-09-20T16:15:13.607
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/116
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==114...
A heap-buffer-overflow in swfaction.c:398
https://api.github.com/repos/swftools/swftools/issues/116/comments
0
2020-08-05T07:06:56Z
2020-08-05T07:09:11Z
https://github.com/swftools/swftools/issues/116
673,307,783
116
CVE-2021-39569
2021-09-20T16:15:13.650
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function OpAdvance() located in swfaction.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/114" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/114
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==201...
A heap-buffer-overflow in swfaction.c:254
https://api.github.com/repos/swftools/swftools/issues/114/comments
0
2020-08-05T06:59:30Z
2020-08-05T07:09:59Z
https://github.com/swftools/swftools/issues/114
673,303,749
114
CVE-2021-39574
2021-09-20T16:15:13.693
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function pool_read() located in pool.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/124
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` /home/seviezhou/swftools/lib/rfxswf.c:520 #1 0x55e4357ac829 in pool...
A heap-buffer-overflow in rfxswf.c:520
https://api.github.com/repos/swftools/swftools/issues/124/comments
0
2020-08-05T07:40:08Z
2020-08-05T07:40:08Z
https://github.com/swftools/swftools/issues/124
673,326,905
124
CVE-2021-39575
2021-09-20T16:15:13.737
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function dump_method() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/128" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/128
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ...
A Segmentation fault in abc.c:361
https://api.github.com/repos/swftools/swftools/issues/128/comments
0
2020-08-06T05:20:06Z
2020-08-06T05:20:06Z
https://github.com/swftools/swftools/issues/128
674,025,035
128
CVE-2021-39577
2021-09-20T16:15:13.777
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function main() located in swfdump.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/121" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/121
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==463...
A heap-buffer-overflow in swfdump.c:1406
https://api.github.com/repos/swftools/swftools/issues/121/comments
0
2020-08-05T07:26:44Z
2020-08-05T07:26:44Z
https://github.com/swftools/swftools/issues/121
673,319,238
121
CVE-2021-39579
2021-09-20T16:15:13.817
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function string_hash() located in q.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==504...
A heap-buffer-overflow in q.c:727
https://api.github.com/repos/swftools/swftools/issues/125/comments
0
2020-08-05T07:42:59Z
2020-08-05T07:42:59Z
https://github.com/swftools/swftools/issues/125
673,328,772
125
CVE-2021-39582
2021-09-20T16:15:13.860
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_GetPlaceObject() located in swfobject.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/122
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==166...
A heap-buffer-overflow in swfobject.c:195
https://api.github.com/repos/swftools/swftools/issues/122/comments
0
2020-08-05T07:32:22Z
2020-08-05T07:32:22Z
https://github.com/swftools/swftools/issues/122
673,322,461
122
CVE-2021-39583
2021-09-20T16:15:13.903
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function pool_lookup_string2() located in pool.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ...
A Segmentation fault in pool.c:1043
https://api.github.com/repos/swftools/swftools/issues/136/comments
0
2020-08-06T05:41:56Z
2020-08-06T05:41:56Z
https://github.com/swftools/swftools/issues/136
674,033,430
136
CVE-2021-39584
2021-09-20T16:15:13.947
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function namespace_set_hash() located in pool.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/130
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ...
A Segmentation fault in pool.c:300
https://api.github.com/repos/swftools/swftools/issues/130/comments
0
2020-08-06T05:23:46Z
2020-08-06T05:23:46Z
https://github.com/swftools/swftools/issues/130
674,026,521
130
CVE-2021-39585
2021-09-20T16:15:13.987
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/133" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
https://github.com/matthiaskramm/swftools/issues/133
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ...
A Segmentation fault in abc.c:602
https://api.github.com/repos/swftools/swftools/issues/133/comments
0
2020-08-06T05:33:14Z
2020-08-06T05:33:14Z
https://github.com/swftools/swftools/issues/133
674,030,124
133