cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
34
cve_configurations
listlengths
1
5
url
stringlengths
39
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
58
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
39
62
issue_github_id
int64
128M
2.09B
issue_number
int64
1
122k
CVE-2022-3668
2022-10-26T19:15:25.300
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. This vulnerability affects the function AP4_AtomFactory::CreateAtomFromStream of the component mp4edit. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be u...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/776
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary mp4edit and mp42hevc with my fuzzer, and three crashes incurred, including two memory-leaks from mp4edit and a heap-overflow from mp42hevc. And I think Bug1 and Bug2 are different. The following is the details. # Bug1 Detected memory leaks in mp4edit. ```...
Memory-leak and heap-overflow bugs in Bento4
https://api.github.com/repos/axiomatic-systems/Bento4/issues/776/comments
0
2022-09-25T14:31:41Z
2023-05-29T02:51:14Z
https://github.com/axiomatic-systems/Bento4/issues/776
1,385,048,849
776
CVE-2022-43280
2022-10-28T21:15:09.807
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallExpr->GetReturnCallDropKeepCount.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1982" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C524E018-FAA2-4A8D-B861-6ACE6A675FEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/WebAssembly/wabt/issues/1982
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc-interp-2.wasm [poc-interp-2.wasm.zip]...
Out-of-bound read in OnReturnCallExpr->GetReturnCallDropKeepCount
https://api.github.com/repos/WebAssembly/wabt/issues/1982/comments
1
2022-09-05T12:50:49Z
2022-09-17T19:13:47Z
https://github.com/WebAssembly/wabt/issues/1982
1,361,906,900
1,982
CVE-2022-43281
2022-10-28T21:15:09.883
wasm-interp v1.0.29 was discovered to contain a heap overflow via the component std::vector<wabt::Type, std::allocator<wabt::Type>>::size() at /bits/stl_vector.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1981" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wasm:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "FC0B0732-FA64-456C-9C9E-FC4F182BEEB1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/WebAssembly/wabt/issues/1981
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc-interp-1.wasm [poc-interp-1.wasm....
heap overflow in wasm-interp
https://api.github.com/repos/WebAssembly/wabt/issues/1981/comments
1
2022-09-05T12:50:09Z
2022-09-17T19:11:15Z
https://github.com/WebAssembly/wabt/issues/1981
1,361,905,751
1,981
CVE-2022-43282
2022-10-28T21:15:09.940
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallIndirectExpr->GetReturnCallDropKeepCount.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1983" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C524E018-FAA2-4A8D-B861-6ACE6A675FEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/WebAssembly/wabt/issues/1983
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc-interp-3.wasm [poc-interp-3.wasm.zip]...
Out-of-bound read in OnReturnCallIndirectExpr->GetReturnCallDropKeepCount
https://api.github.com/repos/WebAssembly/wabt/issues/1983/comments
1
2022-09-05T12:51:24Z
2022-09-17T19:15:54Z
https://github.com/WebAssembly/wabt/issues/1983
1,361,907,936
1,983
CVE-2022-43283
2022-10-28T21:15:10.007
wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/1985" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:wabt:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C524E018-FAA2-4A8D-B861-6ACE6A675FEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/WebAssembly/wabt/issues/1985
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept poc_wasm2c-1.wasm [poc_wasm2c-1.wasm.zip]...
Aborted in CWriter::Write at wasm2c
https://api.github.com/repos/WebAssembly/wabt/issues/1985/comments
1
2022-09-05T12:58:25Z
2022-10-03T06:27:37Z
https://github.com/WebAssembly/wabt/issues/1985
1,361,920,430
1,985
CVE-2022-3784
2022-10-31T21:15:12.497
A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/806
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in ReadBits, Ap4Mp4AudioInfo.cpp:66, in the newest master branch 5e7bb34a08272c49242196eba1cefab8af55f381, which seems to be incomplete fix of issue #194. Here is the reproducing command: ~~~~ mp42hls poc ~~~~ POC: [mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip](https://git...
Heap overflow in mp4hls, ReadBits, Ap4Mp4AudioInfo.cpp:66
https://api.github.com/repos/axiomatic-systems/Bento4/issues/806/comments
0
2022-10-24T06:03:44Z
2023-05-29T02:38:17Z
https://github.com/axiomatic-systems/Bento4/issues/806
1,420,268,717
806
CVE-2022-3785
2022-10-31T21:15:12.577
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/780
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary Avcinfo with my fuzzer, and a crash incurred—heap-buffer-overflow. The following is the details. I think this error is different from both #731 and #610. # Bug Detected heap-buffer-overflow in Avcinfo. ``` root@4w41awdas71:/# ./Bento4/cmakebuild/avcinfo ...
A heap-buffer-overflow in Avcinfo
https://api.github.com/repos/axiomatic-systems/Bento4/issues/780/comments
3
2022-09-27T18:09:33Z
2023-05-29T02:51:16Z
https://github.com/axiomatic-systems/Bento4/issues/780
1,388,166,902
780
CVE-2022-43361
2022-11-01T19:15:11.450
Senayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the component pop_chart.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/162" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/slims/slims9_bulian/issues/162
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** A Cross site scripting due to unfiltered `$_GET['filter']` **To Reproduce** Steps to reproduce the behavior: 1. Log in as Admin 2. Go to http://localhost/admin/modules/reporting/pop_chart.php?filter=2022%20%27<script>alert(%270xdc9%27);</script> 3. There should be a pop that says '0xdc9...
[Security Bug] XSS in pop_chart.php
https://api.github.com/repos/slims/slims9_bulian/issues/162/comments
0
2022-10-16T08:51:31Z
2022-11-24T07:55:09Z
https://github.com/slims/slims9_bulian/issues/162
1,410,420,838
162
CVE-2022-43362
2022-11-01T19:15:11.503
Senayan Library Management System v9.4.2 was discovered to contain a SQL injection vulnerability via the collType parameter at loan_by_class.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/163" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/slims/slims9_bulian/issues/163
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** An unsanitized collType parameter can be used to perform bloolean base blind SQL Injection attack **To Reproduce** 1. Log in as admin 2. go to http://localhost/admin/modules/reporting/customs/loan_by_class.php?reportView=true&year=2002&class=bbbb&membershipType=a&collType=aaaa 3. capture the...
[Security Bug] Boolean SQL Injection in loan_by_class.php
https://api.github.com/repos/slims/slims9_bulian/issues/163/comments
0
2022-10-16T14:33:45Z
2022-11-24T07:55:41Z
https://github.com/slims/slims9_bulian/issues/163
1,410,507,872
163
CVE-2022-3807
2022-11-01T20:15:22.120
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Incomplete Fix CVE-2019-13238. The manipulation leads to resource consumption. The attack may be launched remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9820612/mp42aac_exhaustive_AP4_RtpAtom50.zip" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F13899-4DE7-4BC0-8E7F-8795F58AA99F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/axiomatic-systems/Bento4/issues/803
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A memory allocation failure unhandled in Ap4RtpAtom.cpp and leads to crashes. This seems to be an incomplete fix of issue #396, CVE-2019-13238. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4RtpAtom.cpp <img width="929" alt="image" src="https://user-images.githubusercontent.com/7632714/196694985-02c...
Incomplete fix of CVE-2019-13238, Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/803/comments
0
2022-10-19T12:55:56Z
2022-10-19T12:55:56Z
https://github.com/axiomatic-systems/Bento4/issues/803
1,414,926,196
803
CVE-2022-3812
2022-11-01T22:15:12.027
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is the function AP4_ContainerAtom::AP4_ContainerAtom of the component mp4encrypt. The manipulation leads to memory leak. The attack may be launched remotely. The exploit has been disclosed to the public and may be us...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/792
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# **Summary** Hi, developers of Bento4, I tested the binary of bento4 with my fuzzer, and some memory-leak crashes incurred. Among them, Bug3-5 may be different from #771. The operation system is Ubuntu 18.04.6 LTS (docker), these crashes with the following. # **Bug1** Detected memory leaks in mp4encrypt, the bug...
Some Memory leaks exist in mp4xx
https://api.github.com/repos/axiomatic-systems/Bento4/issues/792/comments
0
2022-10-06T17:14:56Z
2023-06-26T05:55:54Z
https://github.com/axiomatic-systems/Bento4/issues/792
1,400,040,986
792
CVE-2022-43235
2022-11-02T14:15:12.197
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/337" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x262cc1) in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The vi...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_epel_pixels_8_sse
https://api.github.com/repos/strukturag/libde265/issues/337/comments
5
2022-10-10T14:26:02Z
2023-07-23T16:03:46Z
https://github.com/strukturag/libde265/issues/337
1,403,267,152
337
CVE-2022-43236
2022-11-02T14:15:12.607
Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/343" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Stack-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x14bef2) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile....
Stack-buffer-overflow in fallback-motion.cc: void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/343/comments
2
2022-10-10T15:01:43Z
2023-01-24T16:05:16Z
https://github.com/strukturag/libde265/issues/343
1,403,319,141
343
CVE-2022-43237
2022-11-02T14:15:12.827
Libde265 v1.0.8 was discovered to contain a stack-buffer-overflow vulnerability via void put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/344" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/344
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Stack-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x148bb1) in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofi...
Stack-buffer-overflow in fallback-motion.cc: void put_epel_hv_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/344/comments
2
2022-10-10T15:06:43Z
2023-01-24T16:05:06Z
https://github.com/strukturag/libde265/issues/344
1,403,327,299
344
CVE-2022-43238
2022-11-02T14:15:12.990
Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/336" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/336
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description SUMMARY: AddressSanitizer: unknown-crash (/libde265/build/libde265/liblibde265.so+0x28fa79) in ff_hevc_put_hevc_qpel_h_3_v_3_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bi...
Unknown crash in sse-motion.cc: ff_hevc_put_hevc_qpel_h_3_v_3_sse
https://api.github.com/repos/strukturag/libde265/issues/336/comments
2
2022-10-10T14:04:51Z
2023-01-24T16:06:16Z
https://github.com/strukturag/libde265/issues/336
1,403,236,062
336
CVE-2022-43239
2022-11-02T14:15:13.140
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_chroma<unsigned short> in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/341" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/341
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x178e82) in void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 ------------...
Heap-buffer-overflow in motion.cc: mc_chroma<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/341/comments
2
2022-10-10T14:44:20Z
2023-01-24T16:05:35Z
https://github.com/strukturag/libde265/issues/341
1,403,293,231
341
CVE-2022-43240
2022-11-02T14:15:13.313
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_qpel_h_2_v_1_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/335" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/335
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x2831a1) in ff_hevc_put_hevc_qpel_h_2_v_1_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file mu...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_hevc_qpel_h_2_v_1_sse
https://api.github.com/repos/strukturag/libde265/issues/335/comments
2
2022-10-10T13:44:54Z
2023-01-24T16:06:27Z
https://github.com/strukturag/libde265/issues/335
1,403,205,674
335
CVE-2022-43241
2022-11-02T14:15:13.517
Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Unknown-crash (/libde265/build/libde265/liblibde265.so+0x27a238) in ff_hevc_put_hevc_qpel_v_3_8_sse(short*, long, unsigned char const*, long, int, int, short*) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must be a r...
Crash in see-motion.cc: ff_hevc_put_hevc_qpel_v_3_8_sse
https://api.github.com/repos/strukturag/libde265/issues/338/comments
2
2022-10-10T14:34:34Z
2023-01-24T16:06:05Z
https://github.com/strukturag/libde265/issues/338
1,403,279,658
338
CVE-2022-43242
2022-11-02T14:15:13.637
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_luma<unsigned char> in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/340" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/340
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x1787af) in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- ...
Heap-buffer-overflow in motion.cc: mc_luma<unsigned char>
https://api.github.com/repos/strukturag/libde265/issues/340/comments
2
2022-10-10T14:40:58Z
2023-01-24T16:05:44Z
https://github.com/strukturag/libde265/issues/340
1,403,288,592
340
CVE-2022-43243
2022-11-02T14:15:13.797
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/339" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/339
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x25f5ed) in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video...
Heap-buffer-overflow in sse-motion.cc: ff_hevc_put_weighted_pred_avg_8_sse
https://api.github.com/repos/strukturag/libde265/issues/339/comments
2
2022-10-10T14:36:46Z
2023-01-24T16:05:54Z
https://github.com/strukturag/libde265/issues/339
1,403,282,810
339
CVE-2022-43244
2022-11-02T14:15:13.967
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/342" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/342
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x14b860) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.b...
Heap-buffer-overflow in fallback-motion.cc: in void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/342/comments
2
2022-10-10T14:58:45Z
2023-01-24T16:05:26Z
https://github.com/strukturag/libde265/issues/342
1,403,314,932
342
CVE-2022-43245
2022-11-02T14:15:14.123
Libde265 v1.0.8 was discovered to contain a segmentation violation via apply_sao_internal<unsigned short> in sao.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/352" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/352
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description SEGV /libde265/libde265/sao.cc:231 in void apply_sao_internal<unsigned short>(de265_image*, int, int, slice_segment_header const*, int, int, int, unsigned short const*, int, unsigned short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] video...
SEGV sao.cc: in void apply_sao_internal<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/352/comments
2
2022-10-10T15:37:10Z
2023-01-24T16:03:22Z
https://github.com/strukturag/libde265/issues/352
1,403,369,863
352
CVE-2022-43248
2022-11-02T14:15:14.393
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_weighted_pred_avg_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/349" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/349
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x146253) in put_weighted_pred_avg_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The v...
Heap-buffer-overflow in fallback-motion.cc: put_weighted_pred_avg_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/349/comments
2
2022-10-10T15:25:07Z
2023-01-24T16:03:47Z
https://github.com/strukturag/libde265/issues/349
1,403,353,624
349
CVE-2022-43249
2022-11-02T14:15:14.653
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_hv_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/345" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/345
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x148fda) in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofil...
Heap-buffer-overflow in fallback-motion.cc: void put_epel_hv_fallback<unsigned short>(
https://api.github.com/repos/strukturag/libde265/issues/345/comments
7
2022-10-10T15:09:37Z
2023-01-24T16:04:57Z
https://github.com/strukturag/libde265/issues/345
1,403,331,318
345
CVE-2022-43250
2022-11-02T14:15:14.913
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/346" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/346
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x146a04) in put_qpel_0_0_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must ...
Heap-buffer-overflow in fallback-motion.cc: in put_qpel_0_0_fallback_16
https://api.github.com/repos/strukturag/libde265/issues/346/comments
2
2022-10-10T15:14:22Z
2023-01-24T16:04:19Z
https://github.com/strukturag/libde265/issues/346
1,403,337,666
346
CVE-2022-43252
2022-11-02T14:15:15.163
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/347" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x1465fb) in put_epel_16_fallback(short*, long, unsigned short const*, long, int, int, int, int, short*, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file...
Heap-buffer-overflow in fallback-motion.cc in put_epel_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/347/comments
2
2022-10-10T15:16:32Z
2023-01-24T16:04:09Z
https://github.com/strukturag/libde265/issues/347
1,403,340,599
347
CVE-2022-43253
2022-11-02T14:15:15.450
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_unweighted_pred_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/348" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/348
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Description Heap-buffer-overflow (/libde265/build/libde265/liblibde265.so+0x145b6b) in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int) ### Version ```shell $ ./dec265 -h dec265 v1.0.8 -------------- usage: dec265 [options] videofile.bin The video file must b...
Heap-buffer-overflow in fallback-motion.cc: put_unweighted_pred_16_fallback
https://api.github.com/repos/strukturag/libde265/issues/348/comments
2
2022-10-10T15:23:13Z
2023-01-24T16:03:58Z
https://github.com/strukturag/libde265/issues/348
1,403,349,600
348
CVE-2022-43254
2022-11-02T14:15:15.637
GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_list_new at utils/list.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2284" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2284
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in gf_list_new utils/list.c:601 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.114...
Memory Leak in gf_list_new utils/list.c:601
https://api.github.com/repos/gpac/gpac/issues/2284/comments
0
2022-10-11T07:44:42Z
2022-10-11T11:02:16Z
https://github.com/gpac/gpac/issues/2284
1,404,158,827
2,284
CVE-2022-43255
2022-11-02T14:15:15.917
GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_odf_new_iod at odf/odf_code.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2285" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2285
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in gf_odf_new_iod odf/odf_code.c:415 ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev368-gfd054169b-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/1...
Memory Leak in gf_odf_new_iod odf/odf_code.c:415
https://api.github.com/repos/gpac/gpac/issues/2285/comments
0
2022-10-11T07:56:13Z
2022-10-11T11:02:17Z
https://github.com/gpac/gpac/issues/2285
1,404,173,443
2,285
CVE-2022-42919
2022-11-07T00:15:09.697
Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in ma...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/python/cpython/compare/v3.10.8...v3.10.9" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/python/cpython/compare/v3.9.15...v3.9.16" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90DBA72-F261-408A-B8DD-5D2DD7E5985F", "versionEndExcluding": null, "versionEndIncluding": "3.7.15", "versionStartExcludin...
https://github.com/python/cpython/issues/97514
[ "Third Party Advisory" ]
github.com
[ "python", "cpython" ]
## TL;DR Python 3.9, 3.10, and 3.11.0rc2 on Linux may allow for a local privilege escalation attack in a non-default configuration when code uses the `multiprocessing` module and configures `multiprocessing` to use the *forkserver* start method. ## Details The Python `multiprocessing` library, when used with t...
Linux specific local privilege escalation via the multiprocessing forkserver start method - CVE-2022-42919
https://api.github.com/repos/python/cpython/issues/97514/comments
13
2022-09-23T19:24:04Z
2023-06-27T13:19:22Z
https://github.com/python/cpython/issues/97514
1,384,215,836
97,514
CVE-2022-42919
2022-11-07T00:15:09.697
Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in ma...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/python/cpython/compare/v3.10.8...v3.10.9" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/python/cpython/compare/v3.9.15...v3.9.16" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90DBA72-F261-408A-B8DD-5D2DD7E5985F", "versionEndExcluding": null, "versionEndIncluding": "3.7.15", "versionStartExcludin...
https://github.com/python/cpython/issues/97514#issuecomment-1310277840
[ "Third Party Advisory" ]
github.com
[ "python", "cpython" ]
## TL;DR Python 3.9, 3.10, and 3.11.0rc2 on Linux may allow for a local privilege escalation attack in a non-default configuration when code uses the `multiprocessing` module and configures `multiprocessing` to use the *forkserver* start method. ## Details The Python `multiprocessing` library, when used with t...
Linux specific local privilege escalation via the multiprocessing forkserver start method - CVE-2022-42919
https://api.github.com/repos/python/cpython/issues/97514/comments
13
2022-09-23T19:24:04Z
2023-06-27T13:19:22Z
https://github.com/python/cpython/issues/97514
1,384,215,836
97,514
CVE-2022-45061
2022-11-09T07:15:09.887
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote serv...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/python/cpython/issues/98433" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "20A23D09-CFA7-4028-A5E9-7AD784C2B9D8", "versionEndExcluding": null, "versionEndIncluding": "3.7.15", "versionStartExcludin...
https://github.com/python/cpython/issues/98433
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "python", "cpython" ]
# Bug report Originally reported to the security address on September 9. ```python ('xn--016c'+'a'*5000).encode('utf-8').decode('idna') ``` The execution time is not linear in relation to the input string size, which can cause slowness with large inputs: 10 chars = 0.016 seconds 100 chars = 0.047 seconds...
Slow IDNA decoding with large strings [CVE-2022-45061]
https://api.github.com/repos/python/cpython/issues/98433/comments
4
2022-10-19T06:12:24Z
2022-11-09T10:50:40Z
https://github.com/python/cpython/issues/98433
1,414,357,245
98,433
CVE-2022-3974
2022-11-13T10:15:10.333
A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is the function AP4_StdcFileByteStream::ReadPartial of the file Ap4StdCFileByteStream.cpp of the component mp4info. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/9987970/mp4info_overflow_ReadPartial341.zip" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:2022-10-08:*:*:*:*:*:*:*", "matchCriteriaId": "E6D96205-9447-4E3E-B05C-A45E8353CF6C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/axiomatic-systems/Bento4/issues/812
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is an heap overflow in ReadPartial, Ap4StdCFileByteStream.cpp:341, in the newest master branch 5e7bb34a08272c49242196eba1cefab8af55f381, which seems to be incomplete fix of issue #510. Here is the reproducing command: ~~~~ mp42info poc ~~~~ POC: [mp4info_overflow_ReadPartial341.zip](htt...
Heap overflow in mp4info, ReadPartial, Ap4StdCFileByteStream.cpp:341
https://api.github.com/repos/axiomatic-systems/Bento4/issues/812/comments
0
2022-11-11T07:45:28Z
2022-11-11T07:46:10Z
https://github.com/axiomatic-systems/Bento4/issues/812
1,445,073,819
812
CVE-2022-43323
2022-11-14T20:15:17.740
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Top Up Balance component under the Edit Member module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/28#issue-1410026516" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/28#issue-1410026516
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the backend, member center, editing, Top up balance. To exploit this vulnerability, a quasi-prepared HTML file needs to be opened 1、Go to the background --> member center--> edit member--> Top up balance ![图片1](https://user-images.githubu...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/28/comments
1
2022-10-15T03:24:29Z
2023-02-28T02:38:05Z
https://github.com/weng-xianhu/eyoucms/issues/28
1,410,026,516
28
CVE-2022-44387
2022-11-14T20:15:18.233
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Basic Information component under the Edit Member module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/29
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the backend, member center, edit member profile. To exploit this vulnerability, a constructed HTML file needs to be opened 1. Enter the background - > member center - > edit members - > basic information ![图片1](https://user-images.githubu...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/29/comments
1
2022-10-27T13:36:23Z
2023-02-24T07:42:24Z
https://github.com/weng-xianhu/eyoucms/issues/29
1,425,651,916
29
CVE-2022-44389
2022-11-14T20:15:18.593
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Edit Admin Profile module. This vulnerability allows attackers to arbitrarily change Administrator account information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/30
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the background, edit the administrator profile. This vulnerability may cause the modification of personal information such as administrator password, mobile phone number, and email address. To exploit this vulnerability, a constructed HTML ...
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/30/comments
1
2022-10-29T03:58:24Z
2023-02-21T02:49:11Z
https://github.com/weng-xianhu/eyoucms/issues/30
1,428,062,999
30
CVE-2022-44390
2022-11-14T20:15:18.950
A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/31
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version:V1.5.9-UTF8-SP1 ![图片1](https://user-images.githubusercontent.com/83074322/198816360-bae5d187-3aeb-4d61-be73-3c1d333fde57.png) 1、Go to the background --> basic information--> the record number and public security record number, and click the code mode to modify to the code mode. ![图片2](https://user-images.git...
EyouCMS v1.5.9 has multiple vulnerabilities, stored cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/31/comments
1
2022-10-29T06:04:09Z
2023-02-21T01:49:51Z
https://github.com/weng-xianhu/eyoucms/issues/31
1,428,108,510
31
CVE-2022-43183
2022-11-17T21:15:15.837
XXL-Job before v2.3.1 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3002" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9117C48-ADBB-4018-8476-F291CA8A2BF4", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcludi...
https://github.com/xuxueli/xxl-job/issues/3002
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
xxl-job =< 2.3.1 version (latest version) has SSRF vulnerability, which causes low-privileged users to control executor to execute arbitrary commands 1. Vulnerability description XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community. There is an SSRF vulnerabi...
xxl-job =< 2.3.1 version (latest version) has SSRF vulnerability, which causes low-privileged users to control executor to execute arbitrary commands
https://api.github.com/repos/xuxueli/xxl-job/issues/3002/comments
5
2022-10-10T06:59:34Z
2023-03-23T10:51:45Z
https://github.com/xuxueli/xxl-job/issues/3002
1,402,687,023
3,002
CVE-2022-38871
2022-11-18T23:15:20.117
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/free5gc/free5gc/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7AC5244A-13E0-4776-A4C6-58A9784FDAFF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/free5gc/free5gc/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug While testing the free5gc AMF for some NAS basic security features and fuzzing, I could trigger several crashes, while sending malformed NAS message. This means those issues are relatively exposed as they can be trigger by any 5G subscriber, in the principle. Here, all memory issues due to mishand...
[Bugs] AMF breaks due to malformed NAS message
https://api.github.com/repos/free5gc/free5gc/issues/198/comments
4
2021-04-26T13:42:33Z
2023-12-04T08:48:27Z
https://github.com/free5gc/free5gc/issues/198
867,719,689
198
CVE-2022-45280
2022-11-23T21:15:11.310
A cross-site scripting (XSS) vulnerability in the Url parameter in /login.php of EyouCMS v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
name:EyouCMS version: EyouCMS-V1.6.0-UTF8-SP1 Installation package [download:](https://www.eyoucms.com/rizhi/2022/1102/28642.html) ![image](https://user-images.githubusercontent.com/75592724/201087069-82587b7d-1043-4568-a3f8-72bc315b581d.png) Problematic packets: > POST /login.php?m=admin&c=Links&a=add&_ajax=1...
EyouCMS v1.6.0 existence stored cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/32/comments
1
2022-11-10T12:16:56Z
2023-02-21T01:34:50Z
https://github.com/weng-xianhu/eyoucms/issues/32
1,443,805,273
32
CVE-2022-45205
2022-11-25T17:15:11.007
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4128" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4128
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# SysDictMapper.xml queryDictTablePageList。You can see that no precompiling is performed <img width="960" alt="截屏2022-10-25 15 24 58" src="https://user-images.githubusercontent.com/60163868/197709842-99880e4f-25e4-4f5a-a2cb-4fa8dcca4db2.png"> # SysDictController.java <img width="1192" alt="截屏2022-10-25 15 25 29" ...
[CVE-2022-45205]/sys/dict/queryTableData is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4128/comments
2
2022-10-25T07:31:16Z
2022-12-01T07:35:33Z
https://github.com/jeecgboot/JeecgBoot/issues/4128
1,421,998,736
4,128
CVE-2022-45206
2022-11-25T17:15:11.060
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4129" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4129
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
[jeecg-boot漏洞.pdf](https://github.com/jeecgboot/jeecg-boot/files/9858362/jeecg-boot.pdf)
[CVE-2022-45206]/sys/duplicate/check存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4129/comments
12
2022-10-25T08:10:59Z
2024-04-21T07:44:09Z
https://github.com/jeecgboot/JeecgBoot/issues/4129
1,422,048,340
4,129
CVE-2022-45207
2022-11-25T17:15:11.117
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
java提供了原生的预编译sql语句,这样可以防止sql注入问题 # queryListWithPermission 下图没有进行预编译处理,建议换成#{},虽然项目现在没有使用这条语句,但不排除以后的可能,建议修复 <img width="1532" alt="截屏2022-10-25 10 48 22" src="https://user-images.githubusercontent.com/60163868/197670494-95f85eb2-ce58-43ee-9aef-02b9e07ba2b1.png"> # updateNullByEmptyString 下图也使用的是${} <img width="1...
[CVE-2022-45207]这里有几处没有换成预编译,但个人建议修复
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4127/comments
6
2022-10-25T06:07:32Z
2022-12-07T00:59:38Z
https://github.com/jeecgboot/JeecgBoot/issues/4127
1,421,911,807
4,127
CVE-2022-45208
2022-11-25T17:15:11.173
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4126
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# sysUserMapper.xml revertLogicDeleted. You can see that no precompiling is performed <img width="1048" alt="截屏2022-10-25 11 40 04" src="https://user-images.githubusercontent.com/60163868/197676949-8016d0d1-9874-45fd-ba3f-89c63d8a2c90.png"> # SysUserController.java <img width="1278" alt="截屏2022-10-25 11 40 32" sr...
[CVE-2022-45208]/sys/user/putRecycleBin is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4126/comments
2
2022-10-25T03:44:24Z
2022-12-07T01:05:07Z
https://github.com/jeecgboot/JeecgBoot/issues/4126
1,421,795,524
4,126
CVE-2022-45210
2022-11-25T17:15:11.230
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# sysUserMapper.xml deleteLogicDeleted. You can see that no precompiling is performed <img width="617" alt="截屏2022-10-25 11 04 50" src="https://user-images.githubusercontent.com/60163868/197672626-fb8257e3-ca86-484e-a4aa-e878ebb31c34.png"> # SysUserController.java <img width="811" alt="截屏2022-10-25 11 06 04" src="...
[CVE-2022-45210]/sys/user/deleteRecycleBin is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4125/comments
2
2022-10-25T03:12:40Z
2022-12-07T01:16:36Z
https://github.com/jeecgboot/JeecgBoot/issues/4125
1,421,774,671
4,125
CVE-2022-45202
2022-11-29T04:15:11.207
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2296" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2296
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Stack buffer overflow in function dimC_box_read at isomedia/box_code_3gpp.c:1070 ### System info ubuntu 20.04 lts ### version info: ··· /MP4Box -version MP4Box - GPAC version 2.1-DEV-rev428-gcb8ae46c8-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please ...
Stack buffer overflow in function dimC_box_read at isomedia/box_code_3gpp.c:1070
https://api.github.com/repos/gpac/gpac/issues/2296/comments
1
2022-10-31T01:21:46Z
2022-11-04T08:28:44Z
https://github.com/gpac/gpac/issues/2296
1,429,110,423
2,296
CVE-2022-45204
2022-11-29T04:15:11.253
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2307" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2307
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in dimC_box_read at isomedia/box_code_3gpp.c:1060 ### System info ubuntu 20.04 lts ### version info: ``` ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev460-g9d963dc62-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in y...
Memory Leak in dimC_box_read at isomedia/box_code_3gpp.c:1060
https://api.github.com/repos/gpac/gpac/issues/2307/comments
1
2022-11-07T12:35:15Z
2022-11-08T02:28:56Z
https://github.com/gpac/gpac/issues/2307
1,438,293,014
2,307
CVE-2022-4202
2022-11-29T09:15:09.460
A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1HVWa6IpAbvsMS5rx091RfjUB4GfXrMLE/view" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev490-g68064e101-master:*:*:*:*:*:*:*", "matchCriteriaId": "C49A23A9-D02C-438B-8283-93F59CD58E1D", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2333
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ Hi, a CVE was issued affecting gpac and I wasn't able to find any report here or any fix. [VulDB has a "writeup"](https://vuldb.com/?id.21451...
Integer Overflow in function lsr_translate_coords at laser/lsr_dec.c:856 (CVE-2022-4202)
https://api.github.com/repos/gpac/gpac/issues/2333/comments
2
2022-11-29T22:29:30Z
2022-12-13T21:31:57Z
https://github.com/gpac/gpac/issues/2333
1,468,785,287
2,333
CVE-2022-45343
2022-11-29T16:15:09.293
GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2315" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2315
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
# Description Heap use after free in Q_IsTypeOn at gpac/src/bifs/unquantize.c:175:12 # System info Ubuntu 20.04 lts # Version info ```shell MP4Box - GPAC version 2.1-DEV-rev478-g696e6f868-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your r...
Heap use after free in Q_IsTypeOn at gpac/src/bifs/unquantize.c
https://api.github.com/repos/gpac/gpac/issues/2315/comments
0
2022-11-14T01:55:34Z
2022-11-14T13:45:21Z
https://github.com/gpac/gpac/issues/2315
1,447,239,893
2,315
CVE-2022-45332
2022-11-30T03:15:13.973
LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/524" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4643:*:*:*:*:*:*:*", "matchCriteriaId": "8B1D693A-7DFD-40CC-B3E7-D2B6E5F5ADD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/LibreDWG/libredwg/issues/524
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
**System info** Ubuntu x86_64, clang 10.0 version: 0.12.4.4643, last commit [93c2512](https://github.com/LibreDWG/libredwg/commit/93c25124c191987af168ace9fe4b5623061874bd) **Command line** ./dwg2dxf poc **Poc** poc: [poc](https://github.com/iorra-cifer/Poc/blob/main/libredwg/heap-buffer-overflow?raw=true) ...
heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c
https://api.github.com/repos/LibreDWG/libredwg/issues/524/comments
1
2022-11-13T04:23:10Z
2022-11-30T12:14:12Z
https://github.com/LibreDWG/libredwg/issues/524
1,446,725,478
524
CVE-2022-45283
2022-12-06T00:15:10.257
GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the smil_parse_time_list parameter at /scenegraph/svg_attributes.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2295" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2295
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
GPAC-2.0.0 MP4Box: stack overflow with unlimited length and controllable content in smil_parse_time_list
https://api.github.com/repos/gpac/gpac/issues/2295/comments
0
2022-10-29T18:52:22Z
2022-11-04T08:28:14Z
https://github.com/gpac/gpac/issues/2295
1,428,405,742
2,295
CVE-2022-45688
2022-12-13T15:15:11.267
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2748" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/2748
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: openjdk_8_201 hutool版本: 5.8.10(请确保最新尝试是否还有问题) ### 问题描述(包括截图) 1. 复现代码 ``` public static void main(String[] args) throws IOException { String s="<a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a>...
Find a StackOverflowError which may lead to dos in hutool-json
https://api.github.com/repos/dromara/hutool/issues/2748/comments
7
2022-11-19T13:02:23Z
2024-01-05T04:37:53Z
https://github.com/dromara/hutool/issues/2748
1,456,460,513
2,748
CVE-2022-45689
2022-12-13T15:15:11.323
hutool-json v5.8.10 was discovered to contain an out of memory error.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2747" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/2747
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: openjdk_8_201 hutool版本: 5.8.10(请确保最新尝试是否还有问题) ### 问题描述(包括截图) 1. 复现代码 ``` public static void main(String[] args) { String a="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{'a':1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}"; JSONObject jsonObject=new JSONO...
Find a OutOfMemoryError which may lead to dos in hutool-json
https://api.github.com/repos/dromara/hutool/issues/2747/comments
3
2022-11-19T12:50:17Z
2022-12-29T06:43:39Z
https://github.com/dromara/hutool/issues/2747
1,456,453,860
2,747
CVE-2022-45690
2022-12-13T15:15:11.387
A stack overflow in the org.json.JSONTokener.nextValue::JSONTokener.java component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2746" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/2746
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: openjdk_8_201 hutool版本: 5.8.10(请确保最新尝试是否还有问题) ### 问题描述(包括截图) 1. 复现代码 ``` public static void main(String[] args) { String a="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{...
Find a StackOverflowError which may lead to dos in hutool-json
https://api.github.com/repos/dromara/hutool/issues/2746/comments
1
2022-11-19T04:16:48Z
2022-11-29T13:17:11Z
https://github.com/dromara/hutool/issues/2746
1,456,194,214
2,746
CVE-2022-4565
2022-12-16T19:15:08.977
A vulnerability classified as problematic was found in Dromara HuTool up to 5.8.10. This vulnerability affects unknown code of the file cn.hutool.core.util.ZipUtil.java. The manipulation leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Up...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2797" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.215...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A7EDB42-B636-4882-A37C-98B85DF1A973", "versionEndExcluding": null, "versionEndIncluding": "5.8.10", "versionStartExcludin...
https://github.com/dromara/hutool/issues/2797
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
# 测试 JDK版本: jdk_8_291 hutool版本: 全版本 # 问题描述 ## 中文 ### 漏洞描述 hutool中存在zip bomb漏洞,此漏洞发生在zip解压时, zip炸弹文件中有大量刻意重复的数据,这种重复数据在压缩的时候是可以被丢弃的,这也就是压缩后的文件其实并不大的原因,但是当解压后,文件会变得非常大,通过脚本(https://github.com/CreeperKong/zipbomb-generator) 可以生成可利用的zip文件,如下图: ![image](https://user-images.githubusercontent.com/120082578/2069...
ZIP bomb vulnerability in HuTool
https://api.github.com/repos/dromara/hutool/issues/2797/comments
6
2022-12-12T07:13:25Z
2023-06-05T22:25:09Z
https://github.com/dromara/hutool/issues/2797
1,491,166,936
2,797
CVE-2022-4584
2022-12-17T13:15:09.483
A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/818
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: When I tested the latest mp42aac, the following crash occurred. ## The problem The optput of mp42aac_asan: ``` ==115490==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ee71 at pc 0x000000509921 bp 0x7fffffffd410 sp 0x7fffffffd400 READ of size 1 at 0x60200000ee71 th...
heap-buffer-overflow in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/818/comments
0
2022-11-26T08:35:48Z
2023-05-29T02:39:18Z
https://github.com/axiomatic-systems/Bento4/issues/818
1,465,089,664
818
CVE-2022-46489
2023-01-05T15:15:10.483
GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the gf_isom_box_parse_ex function at box_funcs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2328" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2328
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A memory leak has occurred when running program MP4Box, this can reproduce on the lattest commit. ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev505-gb9577e6ad-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our wor...
Memory leak in gf_isom_box_parse_ex function of box_funcs.c:166:13
https://api.github.com/repos/gpac/gpac/issues/2328/comments
0
2022-11-28T06:47:39Z
2022-11-28T10:06:52Z
https://github.com/gpac/gpac/issues/2328
1,465,902,126
2,328
CVE-2022-46490
2023-01-05T15:15:10.527
GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the afrt_box_read function at box_code_adobe.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2327
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A memory leak has occurred when running program MP4Box, this can reproduce on the lattest commit. ### Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev505-gb9577e6ad-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our wor...
Memory leak in afrt_box_read function of box_code_adobe.c:706:35
https://api.github.com/repos/gpac/gpac/issues/2327/comments
0
2022-11-28T06:30:26Z
2022-11-28T10:06:51Z
https://github.com/gpac/gpac/issues/2327
1,465,889,278
2,327
CVE-2022-47086
2023-01-05T15:15:10.573
GPAC MP4Box v2.1-DEV-rev574-g9d5bb184b contains a segmentation violation via the function gf_sm_load_init_swf at scene_manager/swf_parse.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2337" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
missing check in gf_sm_load_init_swf, causing Segmentation fault
https://api.github.com/repos/gpac/gpac/issues/2337/comments
0
2022-12-09T20:12:45Z
2022-12-12T09:59:00Z
https://github.com/gpac/gpac/issues/2337
1,487,390,903
2,337
CVE-2022-47087
2023-01-05T15:15:10.620
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b has a Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2339" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2339
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2339/comments
0
2022-12-10T10:00:27Z
2022-12-12T09:59:01Z
https://github.com/gpac/gpac/issues/2339
1,488,317,476
2,339
CVE-2022-47088
2023-01-05T15:15:10.663
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2340" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2340
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Another Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2340/comments
0
2022-12-10T10:08:12Z
2022-12-12T09:59:02Z
https://github.com/gpac/gpac/issues/2340
1,488,326,210
2,340
CVE-2022-47089
2023-01-05T15:15:10.707
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow via gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2338" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2338
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2338/comments
0
2022-12-10T09:54:16Z
2022-12-12T09:59:01Z
https://github.com/gpac/gpac/issues/2338
1,488,308,020
2,338
CVE-2022-47091
2023-01-05T15:15:10.750
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow in gf_text_process_sub function of filters/load_text.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2343" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in gf_text_process_sub function of filters/load_text.c
https://api.github.com/repos/gpac/gpac/issues/2343/comments
0
2022-12-11T13:21:25Z
2022-12-12T09:59:02Z
https://github.com/gpac/gpac/issues/2343
1,489,970,920
2,343
CVE-2022-47092
2023-01-05T15:15:10.793
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is contains an Integer overflow vulnerability in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2347" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Integer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316
https://api.github.com/repos/gpac/gpac/issues/2347/comments
0
2022-12-11T14:02:17Z
2022-12-12T09:59:04Z
https://github.com/gpac/gpac/issues/2347
1,490,026,124
2,347
CVE-2022-47093
2023-01-05T15:15:10.837
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to heap use-after-free via filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2344" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2344
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
heap-use-after-free filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid
https://api.github.com/repos/gpac/gpac/issues/2344/comments
0
2022-12-11T13:29:49Z
2022-12-12T09:59:03Z
https://github.com/gpac/gpac/issues/2344
1,489,981,443
2,344
CVE-2022-47094
2023-01-05T15:15:10.880
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer dereference via filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2345" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2345
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Null pointer dereference filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid
https://api.github.com/repos/gpac/gpac/issues/2345/comments
0
2022-12-11T13:39:08Z
2022-12-12T09:59:03Z
https://github.com/gpac/gpac/issues/2345
1,489,995,127
2,345
CVE-2022-47095
2023-01-05T15:15:10.927
GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2346" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2346
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c
https://api.github.com/repos/gpac/gpac/issues/2346/comments
0
2022-12-11T13:53:19Z
2022-12-12T09:59:03Z
https://github.com/gpac/gpac/issues/2346
1,490,015,617
2,346
CVE-2022-47653
2023-01-05T16:15:09.350
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2349" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2349
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in eac3_update_channels function of media_tools/av_parsers.c:9113
https://api.github.com/repos/gpac/gpac/issues/2349/comments
0
2022-12-12T21:08:37Z
2022-12-13T09:18:38Z
https://github.com/gpac/gpac/issues/2349
1,492,772,918
2,349
CVE-2022-47654
2023-01-05T16:15:09.587
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2350" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2350
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261
https://api.github.com/repos/gpac/gpac/issues/2350/comments
0
2022-12-12T21:13:33Z
2022-12-13T09:18:38Z
https://github.com/gpac/gpac/issues/2350
1,492,780,269
2,350
CVE-2022-47655
2023-01-05T16:15:09.803
Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_qpel_fallback<unsigned short>
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/367" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/367
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# Description stack-buffer-overflow (libde265/build/libde265/libde265.so+0x17d304) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file mus...
Another stack-buffer-overflow in function void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/367/comments
3
2022-12-16T09:57:05Z
2023-01-24T16:21:23Z
https://github.com/strukturag/libde265/issues/367
1,499,914,232
367
CVE-2022-47656
2023-01-05T16:15:10.020
GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2353" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2353
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273
https://api.github.com/repos/gpac/gpac/issues/2353/comments
0
2022-12-16T17:03:35Z
2022-12-16T17:36:36Z
https://github.com/gpac/gpac/issues/2353
1,500,560,661
2,353
CVE-2022-47657
2023-01-05T16:15:10.233
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2355" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2355
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
https://api.github.com/repos/gpac/gpac/issues/2355/comments
0
2022-12-17T10:31:33Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2355
1,501,315,271
2,355
CVE-2022-47658
2023-01-05T16:15:10.447
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2356" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2356
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
https://api.github.com/repos/gpac/gpac/issues/2356/comments
0
2022-12-17T10:31:37Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2356
1,501,315,341
2,356
CVE-2022-47659
2023-01-05T16:15:10.670
GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2354" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2354
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data
https://api.github.com/repos/gpac/gpac/issues/2354/comments
0
2022-12-17T10:31:30Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2354
1,501,315,203
2,354
CVE-2022-47660
2023-01-05T16:15:10.890
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2357" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2357
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
integer overflow in isomedia/isom_write.c:4931
https://api.github.com/repos/gpac/gpac/issues/2357/comments
0
2022-12-17T10:31:40Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2357
1,501,315,390
2,357
CVE-2022-47661
2023-01-05T16:15:11.103
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2358" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2358
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description heap-buffer-overf...
heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
https://api.github.com/repos/gpac/gpac/issues/2358/comments
0
2022-12-18T10:23:38Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2358
1,501,850,698
2,358
CVE-2022-47662
2023-01-05T16:15:11.400
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2359" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2359
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description segment fault (/s...
Infinite recursion in Media_GetSample isomedia/media.c:662
https://api.github.com/repos/gpac/gpac/issues/2359/comments
0
2022-12-18T10:23:42Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2359
1,501,850,761
2,359
CVE-2022-47663
2023-01-05T16:15:11.623
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2360" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2360
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description buffer overflow i...
buffer overflow in h263dmx_process filters/reframe_h263.c:609
https://api.github.com/repos/gpac/gpac/issues/2360/comments
0
2022-12-18T10:23:45Z
2022-12-19T11:26:13Z
https://github.com/gpac/gpac/issues/2360
1,501,850,806
2,360
CVE-2022-47105
2023-01-19T16:15:11.277
Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4393" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4393
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号:3.4.4 ##### 前端版本:vue2版 ##### 问题描述:sql注入检测代码存在绕过. ##### 截图&代码: SqlInjectionUtil类中sql的注释正则为 ```java private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/"); ``` .无法匹配到%0A, 导致可以利用/\*%0A\*/绕过 关键字检测后存在空格,导致绕过 ```java private final static String XSS_STR = "and |extractvalue|u...
jeecg-boot3.4.4 存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments
2
2022-12-10T09:17:39Z
2022-12-23T06:03:37Z
https://github.com/jeecgboot/JeecgBoot/issues/4393
1,488,266,227
4,393
CVE-2022-45537
2023-01-20T19:15:16.093
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments
1
2022-11-14T08:44:20Z
2023-02-20T10:13:49Z
https://github.com/weng-xianhu/eyoucms/issues/34
1,447,630,496
34
CVE-2022-45538
2023-01-20T19:15:16.160
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments
1
2022-11-14T08:49:28Z
2023-02-20T10:13:18Z
https://github.com/weng-xianhu/eyoucms/issues/35
1,447,638,304
35
CVE-2022-45539
2023-01-20T19:15:16.223
EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/38" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file adding with reflected-XSS in the get ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments
1
2022-11-14T09:06:48Z
2023-02-20T08:22:13Z
https://github.com/weng-xianhu/eyoucms/issues/38
1,447,664,065
38
CVE-2022-45540
2023-01-20T19:15:16.287
EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article type adding with reflected-XSS in ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments
1
2022-11-14T09:00:48Z
2023-02-20T08:36:11Z
https://github.com/weng-xianhu/eyoucms/issues/37
1,447,653,340
37
CVE-2022-45541
2023-01-20T19:15:16.347
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article attribute type changing with refle...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments
1
2022-11-14T08:56:29Z
2023-02-20T10:01:25Z
https://github.com/weng-xianhu/eyoucms/issues/36
1,447,647,465
36
CVE-2022-45542
2023-01-20T19:15:16.400
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file management editor with reflected-XSS ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments
1
2022-11-14T08:34:33Z
2023-02-20T10:49:48Z
https://github.com/weng-xianhu/eyoucms/issues/33
1,447,617,306
33
CVE-2022-48152
2023-01-20T19:15:17.727
SQL Injection vulnerability in RemoteClinic 2.0 allows attackers to execute arbitrary commands and gain sensitive information via the id parameter to /medicines/profile.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/remoteclinic/RemoteClinic/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
#### Vulnerability Description: SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server. Vulnerable Endpoint: http://localhost/RemoteClinic/medicines/profile.php?id=30 (My Medicine Profile ID is **30**) #### Step...
SQL Injection in /medicines/profile.php via `id` parameter
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/20/comments
1
2022-12-26T22:39:19Z
2023-01-27T17:13:38Z
https://github.com/remoteclinic/RemoteClinic/issues/20
1,511,290,645
20
CVE-2022-48007
2023-01-27T18:15:14.947
A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1835" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1835
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hello, I found Stored XSS in Piwigo version 13.4.0. **Impact:** In this way, ordinary users can be promoted to administrator users. **Here are the complete attack steps:** 1. Register an ordinary user. ![image](https://user-images.githubusercontent.com/71068573/208852813-4ff58926-0e8b-4940-bb4d-dcba99b4aeae.png)...
Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent
https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments
0
2022-12-21T08:21:08Z
2022-12-25T10:25:36Z
https://github.com/Piwigo/Piwigo/issues/1835
1,505,891,189
1,835
CVE-2023-24162
2023-01-31T16:15:09.220
Deserialization vulnerability in Dromara Hutool v5.8.11 allows attacker to execute arbitrary code via the XmlUtil.readObjectFromXml parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AEX2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "A354824B-591F-4F37-8681-734B7CDE00AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/2855
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### Desc Hutool provides XML utility classes that may be vulnerable to remote code execution when using XmlUtil.readObjectFromXml to interpret untrusted XML strings ### Detailed The program will call XMLDecoder.readObject to parse the XML string, causing a deserialization vulnerability *cn.hutool.core.util....
XmlUtil Deserialization vulnerability
https://api.github.com/repos/dromara/hutool/issues/2855/comments
1
2023-01-13T07:01:40Z
2023-01-15T03:03:37Z
https://github.com/dromara/hutool/issues/2855
1,531,809,515
2,855
CVE-2023-24163
2023-01-31T16:15:09.270
SQL Inection vulnerability in Dromara hutool before 5.8.21 allows attacker to execute arbitrary code via the aviator template engine.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*", "matchCriteriaId": "786FE505-3B01-48DF-8F35-27B22D0E0312", "versionEndExcluding": "5.8.21", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/dromara/hutool/issues/3149
[ "Issue Tracking" ]
github.com
[ "dromara", "hutool" ]
参考 https://github.com/murphysecurity/murphysec-jetbrains-plugin/issues/15
CVE-2023-24163 不处理下吗?
https://api.github.com/repos/dromara/hutool/issues/3149/comments
5
2023-06-14T02:42:23Z
2023-08-11T03:39:23Z
https://github.com/dromara/hutool/issues/3149
1,755,936,135
3,149
CVE-2021-36535
2023-02-03T18:15:10.653
Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/175" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/cesanta/mjs/issues/175
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
### Built: Jun 30 2021 ### Details: heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf** ### Command: ./mjs -f Heap_Buffer_Overflow.js ### Result: ==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30 READ of ...
Heap-based Buffer Overflow Vulnerability
https://api.github.com/repos/cesanta/mjs/issues/175/comments
4
2021-06-30T07:10:17Z
2021-07-27T07:17:09Z
https://github.com/cesanta/mjs/issues/175
933,378,748
175
CVE-2021-36569
2023-02-03T18:15:11.290
Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/578" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/578
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Hi: FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2 ![image](https://user-images.githubusercontent.com/12816285/124211514-caee0e00-db1f-11eb-8d92-cfe57274f4b4.png) POC: ![image](https://user-images.githubusercontent.com/128...
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments
0
2021-07-02T02:26:46Z
2021-08-10T17:49:19Z
https://github.com/daylightstudio/FUEL-CMS/issues/578
935,354,402
578
CVE-2021-36570
2023-02-03T18:15:11.393
Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/579" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/579
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2 ![image](https://user-images.githubusercontent.com/12816285/124212110-f45b6980-db20-11eb-8087-154ca9d707ab.png) POC: ![image](https://user-images.githubusercontent.com/128162...
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments
0
2021-07-02T02:35:59Z
2021-07-03T01:33:05Z
https://github.com/daylightstudio/FUEL-CMS/issues/579
935,357,769
579
CVE-2021-37304
2023-02-03T18:15:11.770
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/2793" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2", "versionEndExcluding": null, "versionEndIncluding": "2.4.5", "versionStartExcluding":...
https://github.com/jeecgboot/jeecg-boot/issues/2793
[ "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 2.4.5 ![image](https://user-images.githubusercontent.com/15991940/125751270-42b4ea1e-4ae3-4b8c-a669-b03eca42ac19.png) ##### 问题描述: Unauthorized access to the httptrace interface reveals sensitive information such as user cookies ##### 截图&代码: api interface http://Ip:8080/jeecg-boot/actuator/httptra...
[security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments
1
2021-07-15T08:12:15Z
2021-07-15T10:06:18Z
https://github.com/jeecgboot/JeecgBoot/issues/2793
945,118,917
2,793
CVE-2021-37305
2023-02-03T18:15:11.890
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/2794" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2", "versionEndExcluding": null, "versionEndIncluding": "2.4.5", "versionStartExcluding":...
https://github.com/jeecgboot/jeecg-boot/issues/2794
[ "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: <=2.4.5 ##### 问题描述: ###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin ![image](https://user-images.githubusercontent.com/15991940/125753825-06d1da62-e1d7-4270-9076-c3802880c76d.png) leaks sensitive information such as phone .etc ###### 2. Enumerate usernames api ur...
[2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments
1
2021-07-15T08:32:21Z
2021-08-05T07:02:44Z
https://github.com/jeecgboot/JeecgBoot/issues/2794
945,135,797
2,794
CVE-2022-45755
2023-02-08T19:15:11.600
Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/39" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/39
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version:V1.6.0-UTF8-SP1 ![屏幕截图1](https://user-images.githubusercontent.com/83074322/202837935-26b30126-1f5f-4047-82f2-f92859b1b81e.jpg) 1. Go to the background --> basic information--> home page description ![图片2](https://user-images.githubusercontent.com/83074322/202837990-8acd9355-f6bd-4392-80ca-377a52eab003.png) ...
Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments
1
2022-11-19T06:37:02Z
2023-02-20T08:21:46Z
https://github.com/weng-xianhu/eyoucms/issues/39
1,456,264,360
39
CVE-2023-0841
2023-02-15T14:15:13.283
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": null, "url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw" }, { "source": "cna@vuldb.com", "tags": null, "url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4" }, { "source": "cna@vuldb.com", "tags": nu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*", "matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/gpac/gpac/issues/2396
null
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677
https://api.github.com/repos/gpac/gpac/issues/2396/comments
1
2023-02-09T14:19:15Z
2023-02-13T16:32:29Z
https://github.com/gpac/gpac/issues/2396
1,577,978,840
2,396
CVE-2023-24329
2023-02-17T15:15:12.243
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/python/cpython/issues/102153" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/pull/99421" }, { "source": "cve@mitre.org", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC324629-0240-4DC0-BAFA-D476D5FDDA61", "versionEndExcluding": "3.7.17", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/python/cpython/issues/102153
[ "Issue Tracking" ]
github.com
[ "python", "cpython" ]
Everyone (including the [submitter](https://pointernull.com/security/python-url-parse-problem.html) of the now public exploit who submitted the issue half a year ago to `security@python.org` and the [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-24329)) seems to think that #99421 "accidently fixed" CVE-2023-24329. ...
urllib.parse space handling CVE-2023-24329 appears unfixed
https://api.github.com/repos/python/cpython/issues/102153/comments
37
2023-02-22T21:17:17Z
2023-09-15T19:50:54Z
https://github.com/python/cpython/issues/102153
1,595,844,394
102,153
CVE-2023-24369
2023-02-17T17:15:11.857
A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/ujcms/ujcms/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ujcms:ujcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D13E70-E7AE-4FD3-A2A1-9DF1BF256A44", "versionEndExcluding": "5.5.1", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/ujcms/ujcms/issues/3
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "ujcms", "ujcms" ]
Hello, I found that when ujcms V4.1.3 of your company added articles in the background, the redirection link was selected, and the url was not verified when the new window was opened without checking the check box. javascript pseudo-protocol is used to carry out cross-site attack. When the viewer clicks on the articl...
XSS attacks may occur on the UJCMS
https://api.github.com/repos/dromara/ujcms/issues/3/comments
1
2023-01-09T05:23:58Z
2023-01-10T04:15:22Z
https://github.com/dromara/ujcms/issues/3
1,524,956,274
3
CVE-2022-46440
2023-02-24T02:15:10.377
ttftool v0.9.2 was discovered to contain a segmentation violation via the readU16 function at ttf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthias...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# SEGV ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) ttftool - part of swftools 0.9.2 ## sample [poc.zip](https://github.com/matthiaskramm/swftools/files/10101243/poc.zip) ## crash ``` ./ttftool poc1 AddressSanitizer:DEADLYSIGNAL ===================================================...
The function readU16 in ttf.c appears SEGV
https://api.github.com/repos/swftools/swftools/issues/194/comments
0
2022-11-28T07:04:36Z
2022-11-28T07:04:36Z
https://github.com/swftools/swftools/issues/194
1,465,918,774
194
CVE-2023-24751
2023-03-01T15:15:11.393
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/issues/379" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debia...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/379
[ "Exploit", "Patch", "Vendor Advisory" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function mc_chroma at motion.cc:244 # Version ``` git log commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD) ``` # Steps to reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 ./autogen...
NULL Pointer Dereference in function mc_chroma at motion.cc:244
https://api.github.com/repos/strukturag/libde265/issues/379/comments
2
2023-01-28T03:15:32Z
2023-03-04T07:38:40Z
https://github.com/strukturag/libde265/issues/379
1,560,664,401
379