cve_id
stringlengths
13
16
cve_published
timestamp[ns]
cve_descriptions
stringlengths
70
729
cve_metrics
dict
cve_references
listlengths
1
10
cve_configurations
listlengths
1
5
url
stringlengths
40
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
7.94k
issue_title
stringlengths
1
307
issue_comments_url
stringlengths
59
81
issue_comments_count
int64
0
146
issue_created_at
timestamp[ns]
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
40
62
issue_github_id
int64
128M
1.01B
issue_number
int64
94
105k
label
bool
2 classes
issue_msg
stringlengths
120
8.13k
issue_msg_n_tokens
int64
120
8.13k
issue_embedding
listlengths
3.07k
3.07k
__index_level_0__
int64
0
3.61k
CVE-2019-13135
2019-07-01T20:15:11.337000
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1599
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use of uninitialized value in function ReadCUTImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments
2
2019-06-18T10:33:40
2019-07-03T01:30:23Z
https://github.com/ImageMagick/ImageMagick/issues/1599
457,391,875
1,599
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Use of uninitialized value in function ReadCUTImage Issue date: --- start body --- ### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched ...
1,658
[ -0.015480165369808674, -0.008608515374362469, -0.0011243107728660107, 0.023185785859823227, 0.027844998985528946, 0.028589369729161263, -0.019739622250199318, 0.02788635343313217, -0.02566702291369438, 0.021517843008041382, -0.0017661586171016097, -0.006744141224771738, 0.004776382353156805,...
50
CVE-2019-20630
2020-03-24T19:15:21.070000
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1268
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a buffer overflow on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_BS_ReadByte Command: MP4Box -info $PoC ASAN says: ~~~ ==27934==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000a236 at pc 0x0000004...
heap-buffer-overflow on BS_ReadByte
https://api.github.com/repos/gpac/gpac/issues/1268/comments
1
2019-07-06T00:10:13
2019-07-07T15:59:28Z
https://github.com/gpac/gpac/issues/1268
464,799,415
1,268
true
This is a GitHub Issue repo:gpac owner:gpac Title : heap-buffer-overflow on BS_ReadByte Issue date: --- start body --- Hi, Our fuzzer found a buffer overflow on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_BS_ReadByte Command: MP4Box -info...
2,477
[ -0.018943902105093002, 0.02835012599825859, -0.006514248438179493, 0.010275277309119701, 0.0515589602291584, 0.020828068256378174, -0.019557351246476173, 0.04440205171704292, 0.0007640731637366116, 0.02776588872075081, -0.008602897636592388, 0.03058483451604843, 0.017541730776429176, 0.030...
153
CVE-2019-16712
2019-09-23T12:15:10.707000
ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:*:*:*:*:*:*:*", "matchCriteriaId": "98A09968-FA06-4217-82A0-802531283B4F", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1557
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in WritePS3Image
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1557/comments
2
2019-04-28T04:35:49
2020-10-30T02:44:04Z
https://github.com/ImageMagick/ImageMagick/issues/1557
438,012,692
1,557
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory leaks in WritePS3Image Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/Im...
2,558
[ -0.01453135535120964, 0.004641398321837187, -0.005771390162408352, 0.02798331528902054, 0.030304014682769775, 0.020845815539360046, -0.012878531590104103, 0.03000717982649803, -0.011657466180622578, 0.020238656550645828, 0.013843240216374397, -0.010773710906505585, 0.008911754935979843, 0....
94
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Hello, everyone. Is there any method to obtain the frame data of the hevc tiled video? When i use MP4Box to produce DASH video from a single MP4 file, I can simply concatenate the init.mp4 and the .m4s files like this: ``` cat init.mp4 1.m4s 2.m4s 3.m4s > target.mp4 ``` Then i can use other tools to obtain the fra...
How to obtain the frame data?
https://api.github.com/repos/gpac/gpac/issues/1751/comments
3
2021-04-21T07:12:36
2021-04-21T08:53:45Z
https://github.com/gpac/gpac/issues/1751
863,524,074
1,751
false
This is a GitHub Issue repo:gpac owner:gpac Title : How to obtain the frame data? Issue date: --- start body --- Hello, everyone. Is there any method to obtain the frame data of the hevc tiled video? When i use MP4Box to produce DASH video from a single MP4 file, I can simply concatenate the init.mp4 and the .m4s fil...
894
[ -0.032190579921007156, 0.021399762481451035, -0.02220301143825054, -0.010245212353765965, 0.022339412942528725, 0.0011603536549955606, 0.0011631953530013561, 0.05844014510512352, -0.030932661145925522, -0.008858471177518368, -0.00007116046617738903, -0.02915945090353489, 0.019474996253848076...
1,760
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
I think I am confused by the way the list of props are propagated, in particular ```#Period``` (but the code shows nothing particular compared to ```#PStart``` so I assume the error comes from me). If I execute (one props but then what is the separator? ':'?) ```gpac -i avgen:dur=30:sr=48000:ch=2 @ enc:c=aac:FID=GEN...
question on multiple props lists propagation
https://api.github.com/repos/gpac/gpac/issues/1800/comments
2
2021-05-24T13:22:34
2021-05-25T11:46:50Z
https://github.com/gpac/gpac/issues/1800
899,655,548
1,800
false
This is a GitHub Issue repo:gpac owner:gpac Title : question on multiple props lists propagation Issue date: --- start body --- I think I am confused by the way the list of props are propagated, in particular ```#Period``` (but the code shows nothing particular compared to ```#PStart``` so I assume the error comes fro...
1,969
[ -0.01437324471771717, 0.03133758530020714, -0.02028876356780529, 0.007630693726241589, 0.013843618333339691, 0.009166610427200794, -0.03249461576342583, 0.034124232828617096, -0.03699236363172531, 0.0127599211409688, 0.0045873792842030525, -0.01519620232284069, 0.023808741942048073, -0.005...
1,730
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
There is a issue when playing this video
https://api.github.com/repos/gpac/gpac/issues/1874/comments
2
2021-08-09T08:14:16
2022-01-05T17:00:36Z
https://github.com/gpac/gpac/issues/1874
963,751,859
1,874
false
This is a GitHub Issue repo:gpac owner:gpac Title : There is a issue when playing this video Issue date: --- start body --- Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried wit...
1,096
[ -0.01076291874051094, 0.012439239770174026, -0.006775781977921724, -0.03427840769290924, 0.01513388566672802, 0.014413224533200264, -0.02389148622751236, 0.05204427242279053, -0.005322709679603577, 0.04624764993786812, -0.034027744084596634, 0.018423860892653465, 0.010896083898842335, 0.00...
1,670
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
![image](https://user-images.githubusercontent.com/32926995/134191852-ff8fb1f0-1f52-4cc3-8cd9-a2c36bb3e78c.png) ## cause the script to gererate libnghttp2 in directory /deps_android/build/android/nghttp2.sh inserts a command but you didn't install ` autoreconf -i ` ## solution first, install autoconf ...
can't find -lnghttp2
https://api.github.com/repos/gpac/gpac/issues/1916/comments
1
2021-09-21T14:52:54
2021-09-21T15:09:54Z
https://github.com/gpac/gpac/issues/1916
1,002,646,835
1,916
false
This is a GitHub Issue repo:gpac owner:gpac Title : can't find -lnghttp2 Issue date: --- start body --- ![image](https://user-images.githubusercontent.com/32926995/134191852-ff8fb1f0-1f52-4cc3-8cd9-a2c36bb3e78c.png) ## cause the script to gererate libnghttp2 in directory /deps_android/build/android/nghttp2.sh ...
772
[ -0.021533846855163574, 0.030356083065271378, -0.013463735580444336, -0.0025799281429499388, 0.026087258011102676, -0.007514485623687506, 0.022211438044905663, 0.048054762184619904, -0.041604094207286835, 0.027754133567214012, -0.02066653035581112, 0.006023785099387169, 0.003784346394240856, ...
1,658
CVE-2020-19720
2021-07-13T22:15:09.033000
An unhandled memory allocation failure in Core/AP4IkmsAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/413" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/413
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow inside AP4_IkmsAtom of AP4IkmsAtom.cpp. It is similar to #412 and #396. ./mp42aac input_file /dev/null In file Source/C++/Core/AP4IkmsAtom.cpp AP4_RtpAtom allocates a new buffer to parse the atom in the stream. The unhandled memory allocation failure causes the read content memcpy to ...
Exhaustive memory usage
https://api.github.com/repos/axiomatic-systems/Bento4/issues/413/comments
0
2019-08-09T12:23:30
2019-08-25T16:23:00Z
https://github.com/axiomatic-systems/Bento4/issues/413
478,959,630
413
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Exhaustive memory usage Issue date: --- start body --- There is a buffer overflow inside AP4_IkmsAtom of AP4IkmsAtom.cpp. It is similar to #412 and #396. ./mp42aac input_file /dev/null In file Source/C++/Core/AP4IkmsAtom.cpp AP4_RtpAtom allocat...
4,389
[ -0.0406903475522995, 0.010188862681388855, -0.010571352206170559, -0.0006479937583208084, 0.012491936795413494, 0.004663113970309496, -0.04436875507235527, 0.04417344182729721, -0.027555502951145172, 0.038053613156080246, -0.006803425960242748, 0.015446055680513382, 0.026269687339663506, 0...
271
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Tested with GPAC 1.0.1 (Centos7) and GPAC git (Ubuntu 20.04) Steps to reproduce (filesize ~4GB): ```` cd /tmp wget http://doppelbauer.name/coredump.mp4 MP4Box -inter 500 -tmp /tmp/test -add /tmp/coredump.mp4 -new /tmp/ignore.mp4 ```` Console: ``` free(): double free detected in tcache 2 aborted (core dump...
Coredump: free(): double free detected in tcache 2
https://api.github.com/repos/gpac/gpac/issues/1714/comments
2
2021-03-22T21:43:19
2021-03-23T10:31:25Z
https://github.com/gpac/gpac/issues/1714
838,131,404
1,714
false
This is a GitHub Issue repo:gpac owner:gpac Title : Coredump: free(): double free detected in tcache 2 Issue date: --- start body --- Tested with GPAC 1.0.1 (Centos7) and GPAC git (Ubuntu 20.04) Steps to reproduce (filesize ~4GB): ```` cd /tmp wget http://doppelbauer.name/coredump.mp4 MP4Box -inter 500 -tmp /tm...
481
[ -0.03116566687822342, 0.011711494997143745, -0.010590477846562862, 0.01633482053875923, 0.0037668959703296423, 0.015165063552558422, -0.027350030839443207, 0.04946400970220566, -0.02851978875696659, 0.019760537892580032, -0.02445349097251892, 0.005041095428168774, 0.015165063552558422, -0....
1,778
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
Hi I have problems decoding these files. [err.zip](https://github.com/LibreDWG/libredwg/files/6676817/err.zip) Looks like handle ids and offsets get wrong values. I think MC and UMC can be 8 bytes here. Please verify. Thanks Artur
Errors decoding handles, wrong MC, UMC decoding
https://api.github.com/repos/LibreDWG/libredwg/issues/386/comments
2
2021-06-18T11:53:06
2023-04-22T09:26:28Z
https://github.com/LibreDWG/libredwg/issues/386
924,831,107
386
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Errors decoding handles, wrong MC, UMC decoding Issue date: --- start body --- Hi I have problems decoding these files. [err.zip](https://github.com/LibreDWG/libredwg/files/6676817/err.zip) Looks like handle ids and offsets get wrong values. I think MC an...
397
[ -0.020314421504735947, 0.022810494527220726, -0.014833588153123856, 0.0050635687075555325, 0.029637102037668228, 0.03476457670331001, -0.010360204614698887, 0.04114008694887161, -0.0060822973027825356, 0.008894138038158417, 0.013525404967367649, -0.004063636064529419, -0.02395327389240265, ...
3,016
CVE-2019-7395
2019-02-05T00:29:00.400000
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opens...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "E982CE9C-89F7-4A5D-B036-A9A483493D5B", "versionEndExcluding": "6.9.10-25", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1451
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leak in WritePSDChannel in coders/psd.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1451/comments
2
2019-01-17T03:11:55
2019-02-12T01:45:47Z
https://github.com/ImageMagick/ImageMagick/issues/1451
400,092,278
1,451
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory leak in WritePSDChannel in coders/psd.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](http...
3,013
[ -0.03057810105383396, 0.017588943243026733, -0.004625917878001928, 0.041058290749788284, 0.01621684804558754, 0.01084607932716608, -0.0041228169575333595, 0.030029263347387314, -0.0244363471865654, 0.02799072489142418, 0.009950950741767883, -0.002025472465902567, 0.015628807246685028, 0.00...
4
CVE-2020-23303
2021-06-10T23:15:07.780000
There is a heap-buffer-overflow at jmem-poolman.c:165 in jmem_pools_collect_empty in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3749" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3749
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-me...
heap-buffer-overflow in the jmem_pools_collect_empty
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3749/comments
0
2020-05-17T04:04:34
2020-05-20T10:10:06Z
https://github.com/jerryscript-project/jerryscript/issues/3749
619,604,019
3,749
true
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : heap-buffer-overflow in the jmem_pools_collect_empty Issue date: --- start body --- ###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps python ./tools/build....
7,122
[ -0.04084807634353638, -0.003925450146198273, -0.007997099310159683, 0.0013678768882527947, 0.023552700877189636, -0.009780731052160263, -0.017573151737451553, 0.03157903999090195, -0.03634513542056084, 0.02706148475408554, -0.016871394589543343, -0.0007145489216782153, -0.010372838005423546,...
249
CVE-2019-20632
2020-03-24T19:15:21.180000
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_odf_delete_descriptor in odf/desc_private.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1271" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1271
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_odf_delete_descriptor Command: MP4Box -diso $PoC ASAN says: ~~~ ==26490==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000ff00 (pc 0x000000c3ef6d ...
SEGV on unknown addres on gf_odf_delete_descriptor
https://api.github.com/repos/gpac/gpac/issues/1271/comments
1
2019-07-06T00:25:31
2019-07-07T16:01:07Z
https://github.com/gpac/gpac/issues/1271
464,800,676
1,271
true
This is a GitHub Issue repo:gpac owner:gpac Title : SEGV on unknown addres on gf_odf_delete_descriptor Issue date: --- start body --- Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_odf_delete_descriptor Co...
1,923
[ -0.019610224291682243, 0.02307085134088993, -0.006329305935651064, 0.003316435031592846, 0.02460384927690029, 0.027062715962529182, -0.02288871258497238, 0.04996660724282265, -0.012537186965346336, 0.029901038855314255, -0.033331308513879776, 0.01484427135437727, 0.01403223816305399, 0.007...
155
CVE-2020-23306
2021-06-10T23:15:07.810000
There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3753" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3753
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error...
stack-overflow in ecma_regexp_match
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3753/comments
6
2020-05-18T05:18:42
2020-05-26T13:29:29Z
https://github.com/jerryscript-project/jerryscript/issues/3753
619,915,696
3,753
true
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : stack-overflow in ecma_regexp_match Issue date: --- start body --- ###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python ./tools/build.py --clean --d...
2,063
[ -0.023085808381438255, 0.008586795069277287, -0.0025126931723207235, 0.0071932002902030945, 0.007249507121741772, 0.013562913052737713, -0.014118943363428116, 0.0318133719265461, -0.04645315185189247, 0.007728115189820528, -0.028772801160812378, 0.014048559591174126, -0.014330093748867512, ...
250
CVE-2020-19498
2021-07-21T18:15:09.133000
Floating point exception in function Fraction in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/commit/2710c930918609caaf0a664e9c7bc3dce05d5b58" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libheif:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0C81ED-3820-41B5-8DB0-36E2BC6D993C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/strukturag/libheif/issues/139
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libheif" ]
Hi, I found a FPE bug on the latest commit fd0c01d on master. PoC: https://github.com/strongcourage/PoCs/blob/master/libheif_fd0c01d/PoC_fpe_box.cc:62 Command: examples/heif-info $PoC Valgrind says: ~~~ ==1112== Process terminating with default action of signal 8 (SIGFPE) ==1112== Integer divide by zero at ad...
Floating point exception
https://api.github.com/repos/strukturag/libheif/issues/139/comments
5
2019-07-28T10:14:30
2021-07-26T15:05:00Z
https://github.com/strukturag/libheif/issues/139
473,728,085
139
true
This is a GitHub Issue repo:libheif owner:strukturag Title : Floating point exception Issue date: --- start body --- Hi, I found a FPE bug on the latest commit fd0c01d on master. PoC: https://github.com/strongcourage/PoCs/blob/master/libheif_fd0c01d/PoC_fpe_box.cc:62 Command: examples/heif-info $PoC Valgrind say...
1,005
[ -0.026461098343133926, 0.019339926540851593, -0.0058622220531105995, 0.00940736010670662, 0.04813355579972267, 0.004796363413333893, -0.016899265348911285, 0.05174820497632027, 0.011508183553814888, 0.030956240370869637, -0.0303383506834507, 0.017517155036330223, 0.012867539189755917, 0.02...
280
CVE-2019-20170
2019-12-31T00:15:13.213000
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1328" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1328
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-GF_IPMPX_AUTH_Delete ``` POC file: https://...
AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115
https://api.github.com/repos/gpac/gpac/issues/1328/comments
2
2019-11-09T11:14:15
2020-01-08T12:43:51Z
https://github.com/gpac/gpac/issues/1328
520,393,299
1,328
true
This is a GitHub Issue repo:gpac owner:gpac Title : AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115 Issue date: --- start body --- System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsa...
3,498
[ -0.05073944851756096, 0.01995338499546051, -0.005338858347386122, 0.0017331920098513365, 0.01439683884382248, 0.021222608163952827, -0.03193722292780876, 0.02570916712284088, -0.0063830167055130005, 0.022137630730867386, -0.031405918300151825, 0.00048472185153514147, 0.01153370551764965, -...
132
CVE-2020-21598
2021-09-16T22:15:07.837000
libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unweighted_pred_8_sse function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/237
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file
https://api.github.com/repos/strukturag/libde265/issues/237/comments
3
2019-12-24T11:25:26
2023-01-24T18:03:54Z
https://github.com/strukturag/libde265/issues/237
542,098,137
237
true
This is a GitHub Issue repo:libde265 owner:strukturag Title : heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file Issue date: --- start body --- # heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file I found some problems during fuzzing ## Test Version dev version,...
6,174
[ -0.038629721850156784, 0.02892819419503212, -0.003570089116692543, 0.0021589575335383415, 0.0581209771335125, 0.017859632149338722, -0.01678658463060856, 0.03810054808855057, -0.028134433552622795, 0.0241068284958601, -0.01666899025440216, -0.00855498481541872, -0.01769793964922428, 0.0287...
319
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
MP4Box 1.1.0-DEV compiled standalone from a recent download of master branch Updating handler names for subtitle tracks mp4box -name 3=SubtitleHandler -name 5=NewHandlerName input.mp4 The process works and data seems to be OK, the video plays, but there seems to be some corruption, and no further processing is pos...
In place editing corrupts file
https://api.github.com/repos/gpac/gpac/issues/1924/comments
8
2021-09-30T07:05:37
2021-10-02T00:47:09Z
https://github.com/gpac/gpac/issues/1924
1,011,797,714
1,924
false
This is a GitHub Issue repo:gpac owner:gpac Title : In place editing corrupts file Issue date: --- start body --- MP4Box 1.1.0-DEV compiled standalone from a recent download of master branch Updating handler names for subtitle tracks mp4box -name 3=SubtitleHandler -name 5=NewHandlerName input.mp4 The process work...
819
[ -0.02533310279250145, 0.04822482541203499, -0.011415719985961914, 0.026056475937366486, 0.01475378219038248, 0.04572316259145737, -0.02135455422103405, 0.043100934475660324, -0.01975710690021515, 0.004317628685384989, 0.0036997483111917973, 0.03084881603717804, -0.0034473214764147997, -0.0...
1,652
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
## Affected version the latest commit: https://github.com/LibreDWG/libredwg/tree/45d2a290c65ed691be0901ba2b2ef51044e07a16 and 0.12.4 ## What's the problem? A heap buffer overflow was discovered in add_MULTILEADER in in_dxf.c:4306. ASAN report: ``` ==2370992==ERROR: AddressSanitizer: heap-buffer-overf...
Heap-buffer-overflow in add_MULTILEADER in in_dxf.c
https://api.github.com/repos/LibreDWG/libredwg/issues/381/comments
0
2021-06-15T03:18:18
2021-06-27T06:36:33Z
https://github.com/LibreDWG/libredwg/issues/381
920,945,308
381
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Heap-buffer-overflow in add_MULTILEADER in in_dxf.c Issue date: --- start body --- ## Affected version the latest commit: https://github.com/LibreDWG/libredwg/tree/45d2a290c65ed691be0901ba2b2ef51044e07a16 and 0.12.4 ## What's the problem? A heap b...
3,961
[ -0.029137620702385902, 0.013468347489833832, -0.006545288488268852, 0.01325482502579689, 0.07226918637752533, 0.037185780704021454, -0.0074815028347074986, 0.04010939598083496, 0.0011025157291442156, 0.01647408865392208, -0.01773880049586296, -0.008943311870098114, 0.016999682411551476, -0...
3,021
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
I'm running GPAC on a mac mini with apple silicon, I am getting the following warning when running. "Unexpected thread_info() call return (ipc/send) invalid destination port". I am running the following command ./gpac -i ~/Downloads/meta_n2.mp4 reframer:rt=on @ -o live.m3u8:segdur=10:cdur=0.1:llhls=br:cmaf=cmf2:dmo...
Unexpected thread_info() call return (ipc/send) invalid destination port
https://api.github.com/repos/gpac/gpac/issues/1752/comments
2
2021-04-21T17:12:57
2021-04-22T13:05:46Z
https://github.com/gpac/gpac/issues/1752
864,098,916
1,752
false
This is a GitHub Issue repo:gpac owner:gpac Title : Unexpected thread_info() call return (ipc/send) invalid destination port Issue date: --- start body --- I'm running GPAC on a mac mini with apple silicon, I am getting the following warning when running. "Unexpected thread_info() call return (ipc/send) invalid dest...
504
[ -0.03325510397553444, 0.006931636948138475, -0.015831775963306427, 0.002521705813705921, -0.0007530215079896152, 0.0035809967666864395, -0.020857736468315125, 0.04981285333633423, -0.025199607014656067, 0.03381354361772537, -0.009730817750096321, 0.011280489154160023, 0.01813534088432789, ...
1,759
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
Hello, Running `make check` fails for me on a Gentoo Linux system with version 0.12.4. ``` PASS: alive.test Reading DWG file ../test/test-data/2000/PolyLine2D.dwg Writing DXF file ../PolyLine2D_2000.dxf Reading DWG file ../test/test-data/example_r14.dwg Writing DXF file ../example_r14.dxf Reading DWG file ....
dxf.test fails, roundtrip fail: expect 259, got 262 entities
https://api.github.com/repos/LibreDWG/libredwg/issues/342/comments
4
2021-05-24T08:27:28
2024-02-26T15:18:59Z
https://github.com/LibreDWG/libredwg/issues/342
899,435,592
342
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : dxf.test fails, roundtrip fail: expect 259, got 262 entities Issue date: --- start body --- Hello, Running `make check` fails for me on a Gentoo Linux system with version 0.12.4. ``` PASS: alive.test Reading DWG file ../test/test-data/2000/PolyLine2D....
4,055
[ -0.020872069522738457, 0.03357024863362312, -0.012313615530729294, 0.012886692769825459, 0.022153951227664948, 0.01575961895287037, 0.012577532790601254, 0.033359117805957794, -0.0024336923379451036, -0.015533404424786568, -0.013851875439286232, -0.017765387892723083, -0.00942560937255621, ...
3,053
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
Hi, there. There is a large memory leak issue (> 200 mb) in CreateDescriptorFromStream, Ap4DescriptorFactory.cpp:90 in the newest branch 5922ba762af46. To reproduce it, run ~~~~ mp4info poc ~~~~ POC: [poc.zip](https://github.com/axiomatic-systems/Bento4/files/7014506/mp42aac-leak-CreateDescriptorFromStrea...
Memory leak in CreateDescriptorFromStream, Ap4DescriptorFactory.cpp:90
https://api.github.com/repos/axiomatic-systems/Bento4/issues/640/comments
0
2021-08-19T13:02:05
2021-08-19T13:02:05Z
https://github.com/axiomatic-systems/Bento4/issues/640
974,639,707
640
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Memory leak in CreateDescriptorFromStream, Ap4DescriptorFactory.cpp:90 Issue date: --- start body --- Hi, there. There is a large memory leak issue (> 200 mb) in CreateDescriptorFromStream, Ap4DescriptorFactory.cpp:90 in the newest branch 5922ba762a...
2,486
[ 0.0010001257760450244, 0.017573004588484764, -0.015804652124643326, -0.018409814685583115, 0.023383306339383125, 0.0023012268356978893, -0.0009552262490615249, 0.04982965439558029, -0.016341473907232285, 0.030283039435744286, -0.0031814558897167444, 0.005084014032036066, 0.00332947657443583,...
2,038
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
- [y] I looked for a similar issue and couldn't find any. - [y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [y] I give enough information for contributors to reproduce my issue My m4a causes gpac to segfaults, for my use case this is easily worke...
gpac sefaults trying to parse an m4a file
https://api.github.com/repos/gpac/gpac/issues/1863/comments
2
2021-07-21T15:32:47
2021-07-21T18:20:09Z
https://github.com/gpac/gpac/issues/1863
949,846,615
1,863
false
This is a GitHub Issue repo:gpac owner:gpac Title : gpac sefaults trying to parse an m4a file Issue date: --- start body --- - [y] I looked for a similar issue and couldn't find any. - [y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [y] I give enou...
2,198
[ -0.02260705456137657, 0.01560929324477911, -0.007926036603748798, -0.013181498274207115, -0.011739102192223072, 0.0103823933750391, -0.06209442391991615, 0.03281807526946068, -0.015466481447219849, 0.0383877195417881, -0.0427006259560585, -0.005837418604642153, 0.028190983459353447, 0.0245...
1,680
CVE-2019-11251
2020-02-03T16:15:11.140000
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attac...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/87773" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E20ECB8-B503-4DB2-BCDB-D28E53523C9E", "versionEndExcluding": "1.13.11", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/87773
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in kubectl versions v1.13.10, v1.14.6, and v1.15.3. The issue is of a medium severity and upgrading of kubectl is encouraged to fix the vulnerability. **Am I vulnerable?** Run kubectl version --client and if it returns versions v1.13.10, v1.14.6, and v1.15.3, you are running a vuln...
CVE-2019-11251: kubectl cp symlink vulnerability
https://api.github.com/repos/kubernetes/kubernetes/issues/87773/comments
3
2020-02-03T15:12:22
2022-10-14T02:00:16Z
https://github.com/kubernetes/kubernetes/issues/87773
559,146,411
87,773
true
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2019-11251: kubectl cp symlink vulnerability Issue date: --- start body --- A security issue was discovered in kubectl versions v1.13.10, v1.14.6, and v1.15.3. The issue is of a medium severity and upgrading of kubectl is encouraged to fix the vulnera...
2,279
[ -0.01549535896629095, -0.03394345939159393, -0.010883334092795849, 0.0112295625731349, 0.014032053761184216, -0.0159003809094429, -0.002147596562281251, 0.028299281373620033, 0.007492907345294952, 0.016501381993293762, -0.022916408255696297, -0.02133551612496376, -0.0025395534466952085, 0....
146
CVE-2019-20091
2019-12-30T04:15:11.123000
An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/462" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip) asan output 1 ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x0 out ...
2 segv in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/462/comments
0
2019-12-09T09:00:42
2019-12-09T09:00:42Z
https://github.com/axiomatic-systems/Bento4/issues/462
534,783,741
462
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : 2 segv in mp42ts Issue date: --- start body --- ./mp42ts $poc out poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip) asan output 1 ``` ...
5,147
[ 0.01005334872752428, 0.008593611419200897, -0.012501939199864864, 0.013569273054599762, 0.034186094999313354, 0.02638513408601284, -0.050666991621255875, 0.045863986015319824, -0.025302104651927948, 0.028174489736557007, -0.02012239210307598, 0.012133080512285233, 0.029398784041404724, 0.0...
120
CVE-2021-32265
2021-09-20T16:15:09.913000
An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::WritePartial() located in Ap4ByteStream.cpp. It allows an attacker to cause code execution or information disclosure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/545" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "9684D8EA-E280-40A0-BB75-E7AFB950B234", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-637", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/545
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## System info Ubuntu x86_64, clang 6.0, mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=add...
A global-buffer-overflow in Ap4ByteStream.cpp:783:5
https://api.github.com/repos/axiomatic-systems/Bento4/issues/545/comments
1
2020-08-22T01:47:18
2022-05-01T20:31:46Z
https://github.com/axiomatic-systems/Bento4/issues/545
683,904,034
545
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : A global-buffer-overflow in Ap4ByteStream.cpp:783:5 Issue date: --- start body --- ## System info Ubuntu x86_64, clang 6.0, mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49))...
5,534
[ -0.018951261416077614, 0.021889906376600266, -0.009460637345910072, 0.009318203665316105, 0.04039137437939644, 0.005063915159553289, -0.04195065796375275, 0.037962496280670166, -0.02617792971432209, 0.024768579751253128, -0.01610257476568222, 0.040601279586553574, 0.01859142817556858, 0.02...
328
null
null
null
null
null
null
null
null
null
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision df6d430 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --...
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed in jmem_heap_finalize
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4467/comments
0
2021-01-15T13:46:55
2021-01-15T19:48:14Z
https://github.com/jerryscript-project/jerryscript/issues/4467
786,908,091
4,467
false
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed in jmem_heap_finalize Issue date: --- start body --- ###### JerryScript revision df6d430 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Buil...
1,349
[ -0.016263874247670174, 0.0144810164347291, -0.006176059599965811, 0.0007470888085663319, 0.02265808917582035, -0.031625036150217056, -0.008162027224898338, 0.039568908512592316, -0.03484471142292023, 0.01778344064950943, -0.004415769595652819, -0.0047881389036774635, 0.005389947444200516, ...
2,306
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line .....
Segmentation fault using mp4box in gf_odf_desc_copy, odf_codec.c:381
https://api.github.com/repos/gpac/gpac/issues/1888/comments
1
2021-08-24T11:02:00
2021-08-30T15:34:34Z
https://github.com/gpac/gpac/issues/1888
977,975,107
1,888
false
This is a GitHub Issue repo:gpac owner:gpac Title : Segmentation fault using mp4box in gf_odf_desc_copy, odf_codec.c:381 Issue date: --- start body --- - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly...
5,304
[ -0.016125358641147614, 0.02588236890733242, -0.0164174847304821, 0.015292799100279808, 0.01860843040049076, 0.015920870006084442, -0.01720622554421425, 0.04860977828502655, -0.023034140467643738, 0.015877051278948784, -0.03190016746520996, 0.007785159628838301, 0.04326387122273445, 0.00148...
1,663
CVE-2019-13300
2019-07-05T01:15:10.250000
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1586
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/statistic.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments
3
2019-06-10T15:57:48
2019-07-08T01:49:56Z
https://github.com/ImageMagick/ImageMagick/issues/1586
454,242,285
1,586
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in MagickCore/statistic.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](http...
4,077
[ -0.03132207691669464, -0.0020268040243536234, -0.01333678513765335, -0.006384778302162886, 0.05309811234474182, 0.010037175379693508, -0.032816238701343536, 0.04427148401737213, -0.01171119138598442, 0.035278838127851486, -0.007678335532546043, -0.015979239717125893, 0.01725204475224018, 0...
59
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
👋 Hello, @barbibulle, @dimitry-ishenko, @haridarshan - a potential medium severity NULL Pointer Dereference vulnerability in your repository has been disclosed to us. #### Next Steps 1️⃣ Visit **https://huntr.dev/bounties/2-other-axiomatic-systems/Bento4** for more advisory information. 2️⃣ **[Sign-up](http...
🚨 Potential NULL Pointer Dereference
https://api.github.com/repos/axiomatic-systems/Bento4/issues/605/comments
4
2021-05-12T06:18:28
2021-07-24T18:23:29Z
https://github.com/axiomatic-systems/Bento4/issues/605
889,709,478
605
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : 🚨 Potential NULL Pointer Dereference Issue date: --- start body --- 👋 Hello, @barbibulle, @dimitry-ishenko, @haridarshan - a potential medium severity NULL Pointer Dereference vulnerability in your repository has been disclosed to us. #### Next St...
975
[ -0.024548055604100227, 0.007844073697924614, -0.0023562773130834103, -0.001725199748761952, 0.039472416043281555, 0.0021977918222546577, -0.022623317316174507, 0.047721296548843384, -0.015565942041575909, 0.04310803487896919, -0.00211377558298409, 0.007496551610529423, 0.012556628324091434, ...
2,067
null
null
null
null
null
null
null
null
null
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 2faafa4 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
Assertion 'uint_ptr % JMEM_ALIGNMENT == 0' in jmem_decompress_pointer
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4399/comments
0
2021-01-02T14:20:48
2021-01-07T10:54:00Z
https://github.com/jerryscript-project/jerryscript/issues/4399
777,467,925
4,399
false
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : Assertion 'uint_ptr % JMEM_ALIGNMENT == 0' in jmem_decompress_pointer Issue date: --- start body --- ###### JerryScript revision 2faafa4 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ...
1,386
[ -0.00135273567866534, 0.0065947058610618114, -0.005662969779223204, 0.009913060814142227, 0.023583615198731422, -0.02365998737514019, -0.011379399336874485, 0.048572469502687454, -0.041637908667325974, 0.025340165942907333, -0.0027952082455158234, 0.0064686923287808895, 0.016145000234246254,...
2,325
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
## Affected version the latest commit: https://github.com/LibreDWG/libredwg/tree/45d2a290c65ed691be0901ba2b2ef51044e07a16 and 0.12.4 ## What's the problem? A null pointer deference was discovered in function dxf_read_CMC in in_dxf.c. ASAN report: ``` ==2463508==ERROR: AddressSanitizer: SEGV on unknown ...
Null pointer dereference in function dxf_read_CMC in in_dxf.c
https://api.github.com/repos/LibreDWG/libredwg/issues/367/comments
2
2021-06-10T08:37:16
2022-02-05T13:27:41Z
https://github.com/LibreDWG/libredwg/issues/367
917,072,413
367
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Null pointer dereference in function dxf_read_CMC in in_dxf.c Issue date: --- start body --- ## Affected version the latest commit: https://github.com/LibreDWG/libredwg/tree/45d2a290c65ed691be0901ba2b2ef51044e07a16 and 0.12.4 ## What's the problem? ...
1,943
[ -0.0200850497931242, 0.015725504606962204, 0.0006758711533620954, 0.011500424705445766, 0.04138737544417381, 0.026695139706134796, -0.01715509593486786, 0.038414958864450455, 0.006896716542541981, 0.010162836872041225, -0.03753738850355148, -0.011139488779008389, -0.008966793306171894, -0....
3,034
null
null
null
null
null
null
null
null
null
[ "strukturag", "libde265" ]
Found segfault in slice_segment_header with fuzzing. Following is the call stack: > #0 0x00007ffff166df7b in slice_segment_header::operator= (this=0x61b000000e80) > at ../libde265/slice.h:130 > #1 0x00007ffff15f7dd9 in slice_segment_header::read (this=0x61b000000e80, br=0x7fffffffcb80, > ctx=0x621000002...
Segmentation fault in slice_segment_header
https://api.github.com/repos/strukturag/libde265/issues/290/comments
4
2021-04-02T06:01:40
2021-05-06T09:47:40Z
https://github.com/strukturag/libde265/issues/290
848,986,433
290
false
This is a GitHub Issue repo:libde265 owner:strukturag Title : Segmentation fault in slice_segment_header Issue date: --- start body --- Found segfault in slice_segment_header with fuzzing. Following is the call stack: > #0 0x00007ffff166df7b in slice_segment_header::operator= (this=0x61b000000e80) > at ../lib...
1,715
[ -0.008778274990618229, 0.04375039041042328, -0.009624195285141468, 0.004634009208530188, 0.037784427404403687, 0.009913588874042034, -0.013022716157138348, 0.047757379710674286, -0.015374966897070408, 0.03695334866642952, -0.05223926901817322, -0.010381070896983147, 0.007724585477262735, 0...
3,142
CVE-2020-21834
2021-05-17T21:15:07.400000
A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:241...
1,738
[ -0.017260590568184853, 0.021727342158555984, -0.00457768002524972, 0.015278655104339123, 0.05111619830131531, 0.05425179749727249, -0.017541611567139626, 0.045081645250320435, -0.019316479563713074, 0.02776189334690571, -0.012032125145196915, 0.001094501931220293, 0.012091287411749363, 0.0...
236
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Is there a way to add inband timed metadata to mpeg fragments? I know it's possible to add them to mpeg-ts fragments, but I am trying to make the switch to mpeg4 fragments and need some help figuring out how to add the metadata.
Question? Add inband timed metadata to mpeg4 fragments?
https://api.github.com/repos/gpac/gpac/issues/1755/comments
1
2021-04-22T23:31:14
2021-04-23T10:01:47Z
https://github.com/gpac/gpac/issues/1755
865,573,444
1,755
false
This is a GitHub Issue repo:gpac owner:gpac Title : Question? Add inband timed metadata to mpeg4 fragments? Issue date: --- start body --- Is there a way to add inband timed metadata to mpeg fragments? I know it's possible to add them to mpeg-ts fragments, but I am trying to make the switch to mpeg4 fragments and need...
386
[ -0.015783965587615967, 0.027516432106494904, -0.0293170977383852, 0.011753568425774574, -0.011408909223973751, 0.010128747671842575, -0.06172909215092659, 0.05379490554332733, -0.034184522926807404, 0.02598305232822895, -0.006298815365880728, 0.024041708558797836, 0.0360695980489254, 0.006...
1,757
CVE-2021-20245
2021-03-09T19:15:12.500000
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE"...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "465FCAC7-2745-4B78-AF5C-58D7B3A8D424", "versionEndExcluding": "6.9.11-62", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/3176
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
When `image->ticks_per_second` was set to zero, a division by zero error would happen in line 961. So a crafted file may trigger undefined behavior in the form of division by zero. Maybe there need a `PerceptibleReciprocal()` to do division in line 961? https://github.com/ImageMagick/ImageMagick/blob/74f8868c779a5bd...
Division by zero in WriteAnimatedWEBPImage() in coders/webp.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/3176/comments
2
2021-02-02T06:03:44
2021-02-17T07:16:38Z
https://github.com/ImageMagick/ImageMagick/issues/3176
798,961,516
3,176
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Division by zero in WriteAnimatedWEBPImage() in coders/webp.c Issue date: --- start body --- When `image->ticks_per_second` was set to zero, a division by zero error would happen in line 961. So a crafted file may trigger undefined behavior in the form...
548
[ -0.027291812002658844, -0.0063208164647221565, -0.009974879212677479, 0.027074672281742096, 0.06107069179415703, 0.0010636477963998914, -0.013951259665191174, 0.038270965218544006, -0.021537596359848976, 0.02647753618657589, 0.013462694361805916, 0.020492609590291977, 0.001886405749246478, ...
194
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
Is there such a feature? Also, I cant see progress even though I have --show-progress parameter. Am I doing sth wrong? I have a simple bat file with such line: `mp4decrypt.exe --show-progress --key 1:12345456789 video.mp4 decrypted_video.mp4`
delete file after decryption and no progress dispaly
https://api.github.com/repos/axiomatic-systems/Bento4/issues/580/comments
0
2021-02-20T17:20:54
2021-02-20T17:20:54Z
https://github.com/axiomatic-systems/Bento4/issues/580
812,665,947
580
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : delete file after decryption and no progress dispaly Issue date: --- start body --- Is there such a feature? Also, I cant see progress even though I have --show-progress parameter. Am I doing sth wrong? I have a simple bat file with such line: ...
420
[ -0.029507696628570557, -0.002679927973076701, -0.017108993604779243, 0.0023342533968389034, 0.0054624187760055065, -0.01944894529879093, 0.012884926982223988, 0.055794164538383484, -0.028322527185082436, 0.046768635511398315, 0.02420482039451599, -0.01329517737030983, -0.015057738870382309, ...
2,092
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
https://github.com/axiomatic-systems/Bento4/blob/master/Source/Python/utils/mp4-dash-clone.py can add support to clone live dash $number$ or $time$ template please add support clone of live stream @barbibulle
add support to clone live stream
https://api.github.com/repos/axiomatic-systems/Bento4/issues/598/comments
1
2021-04-14T18:49:15
2022-03-16T15:58:57Z
https://github.com/axiomatic-systems/Bento4/issues/598
858,173,515
598
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : add support to clone live stream Issue date: --- start body --- https://github.com/axiomatic-systems/Bento4/blob/master/Source/Python/utils/mp4-dash-clone.py can add support to clone live dash $number$ or $time$ template please add support clone of ...
364
[ -0.02466820739209652, -0.01082600373774767, -0.024129599332809448, 0.013980702497065067, -0.0060516358353197575, -0.006917254533618689, 0.014596253633499146, 0.06869549304246902, -0.01946680061519146, 0.0419498011469841, 0.037610165774822235, 0.02534531243145466, -0.002100567799061537, -0....
2,074
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
GPAC in Python usage steps
https://api.github.com/repos/gpac/gpac/issues/1871/comments
8
2021-08-04T14:37:13
2021-08-04T15:56:00Z
https://github.com/gpac/gpac/issues/1871
960,556,490
1,871
false
This is a GitHub Issue repo:gpac owner:gpac Title : GPAC in Python usage steps Issue date: --- start body --- Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest v...
2,515
[ -0.02020106464624405, 0.02439960651099682, -0.018631912767887115, -0.010008645243942738, 0.009591618552803993, 0.0028432044200599194, -0.018957052379846573, 0.0465373732149601, -0.03864920511841774, 0.024187559261918068, -0.019395284354686737, -0.031694043427705765, 0.01894291676580906, -0...
1,673
CVE-2019-10714
2019-04-02T21:29:00.250000
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "78CC3088-3ED5-4CED-B051-2A3B58EDA881", "versionEndExcluding": "6.9.10-32", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1495
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Out-of-boundary in function LocaleLowercase of MagickCore/locale.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1495/comments
2
2019-03-04T14:35:44
2019-04-03T01:40:39Z
https://github.com/ImageMagick/ImageMagick/issues/1495
416,830,460
1,495
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Out-of-boundary in function LocaleLowercase of MagickCore/locale.c Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I...
3,470
[ -0.005933769978582859, 0.019936926662921906, -0.002895923098549247, 0.039414290338754654, 0.0271007027477026, 0.03576481714844704, -0.025505749508738518, 0.03444019705057144, -0.04674026370048523, 0.015462945215404034, -0.0008232429972849786, 0.005825637374073267, 0.008062628097832203, 0.0...
29
CVE-2020-23267
2021-09-22T00:15:08.623000
An issue was discovered in gpac 0.8.0. The gf_hinter_track_process function in isom_hinter_track_process.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1479" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1479
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [ y] I looked for a similar issue and couldn't find any. - [ y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ y] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line...
Heap buffer overflow in isom_hinter.c:766 in gf_hinter_track_process()
https://api.github.com/repos/gpac/gpac/issues/1479/comments
2
2020-05-12T16:22:14
2021-09-27T18:50:43Z
https://github.com/gpac/gpac/issues/1479
616,789,021
1,479
true
This is a GitHub Issue repo:gpac owner:gpac Title : Heap buffer overflow in isom_hinter.c:766 in gf_hinter_track_process() Issue date: --- start body --- - [ y] I looked for a similar issue and couldn't find any. - [ y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nig...
4,586
[ -0.04073913395404816, 0.025990841910243034, -0.00866613257676363, -0.005281278397887945, 0.02346731163561344, 0.02638372592628002, -0.030493905767798424, 0.04645107313990593, -0.020928671583533287, 0.02357308939099312, -0.018722472712397575, 0.004178178962320089, 0.022832652553915977, 0.01...
344
null
null
null
null
null
null
null
null
null
[ "jerryscript-project", "jerryscript" ]
I read the article about [V8's snapshot](https://v8.dev/blog/custom-startup-snapshots). AFAIK the snapshot in v8 means initialized context with prepared heap snapshot which was created at the very beginning, that will speed up the bootstrap process. And in Jerry's doc and test file(test-snapshot.c), what I got is t...
Questions: How does snapshot speed up the process?
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4608/comments
4
2021-02-22T11:47:16
2021-02-23T07:41:00Z
https://github.com/jerryscript-project/jerryscript/issues/4608
813,426,925
4,608
false
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : Questions: How does snapshot speed up the process? Issue date: --- start body --- I read the article about [V8's snapshot](https://v8.dev/blog/custom-startup-snapshots). AFAIK the snapshot in v8 means initialized context with prepared heap snap...
1,456
[ 0.023138197138905525, 0.0015205781674012542, -0.0220265481621027, 0.011799369007349014, -0.010878288187086582, -0.022137712687253952, 0.02478979155421257, 0.055296640843153, -0.03868541494011879, 0.045418836176395416, 0.0005394479376263916, -0.007527457550168037, 0.01635713316500187, -0.01...
2,286
CVE-2019-19952
2019-12-24T01:15:11.527000
In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1791" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "857D548F-3DED-4D35-B2AD-4003378032DA", "versionEndExcluding": "7.0.9-7", "versionEndIncluding": null, "versionSt...
https://github.com/ImageMagick/ImageMagick/issues/1791
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free in MngInfoDiscardObject of coders/png.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1791/comments
8
2019-11-27T06:48:11
2020-03-08T20:06:50Z
https://github.com/ImageMagick/ImageMagick/issues/1791
529,151,827
1,791
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-use-after-free in MngInfoDiscardObject of coders/png.c Issue date: --- start body --- ### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searche...
6,204
[ -0.04026085510849953, -0.00016665969451423734, -0.0025839994195848703, -0.011386108584702015, 0.030539074912667274, 0.02364400587975979, -0.02176833711564541, 0.033207282423973083, -0.01589035801589489, 0.04911084845662117, 0.005042513832449913, -0.013156106695532799, 0.004306115210056305, ...
110
CVE-2020-35979
2021-04-21T16:15:08.647000
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b15020f54aff24aaeb64b80771472be8e64a7adc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1662
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1483](https://github.com/gpac/gpac/issues/1483) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --s...
AddressSanitizer: heap-buffer-overflow in gp_rtp_builder_do_avc ietf/rtp_pck_mpeg4.c:436
https://api.github.com/repos/gpac/gpac/issues/1662/comments
0
2020-12-15T12:02:59
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1662
767,522,021
1,662
true
This is a GitHub Issue repo:gpac owner:gpac Title : AddressSanitizer: heap-buffer-overflow in gp_rtp_builder_do_avc ietf/rtp_pck_mpeg4.c:436 Issue date: --- start body --- System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and latest V1.0.1 d8538e8) I think it is probably due to an imc...
3,982
[ -0.04667627438902855, 0.03505803644657135, -0.015844373032450676, -0.001220822799950838, 0.025516558438539505, 0.03581322357058525, -0.03932774066925049, 0.04075097292661667, -0.029524849727749825, 0.0010864868527278304, -0.0359874963760376, 0.0028301305137574673, 0.013578817248344421, 0.0...
213
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Hello,when I got the gpac source code and tried to compile them(./configure && make), the following error appeared. System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 ./configure: 2470: source: not found ** System Configuration Install prefix: /usr/local Source path: /home/dh/Desktop/gpac-master/gpac-...
An error occurred while compiling the file
https://api.github.com/repos/gpac/gpac/issues/1832/comments
6
2021-06-26T16:17:34
2021-06-30T07:04:26Z
https://github.com/gpac/gpac/issues/1832
930,729,715
1,832
false
This is a GitHub Issue repo:gpac owner:gpac Title : An error occurred while compiling the file Issue date: --- start body --- Hello,when I got the gpac source code and tried to compile them(./configure && make), the following error appeared. System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 ./configure: ...
1,765
[ -0.007066189311444759, 0.03537958487868309, -0.001832554116845131, 0.00037128760595805943, 0.006173362024128437, 0.007712360005825758, -0.020663566887378693, 0.04802507534623146, -0.027625534683465958, 0.005068618804216385, -0.04758039861917496, 0.005353489890694618, 0.03515724465250969, -...
1,703
CVE-2020-21815
2021-05-17T19:15:07.490000
A null pointer deference issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114, which causes a denial of service (application crash).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https:...
1,657
[ -0.026382796466350555, 0.037552811205387115, -0.007037408649921417, 0.010533653199672699, 0.06408534198999405, 0.04111643508076668, -0.005951851140707731, 0.044081129133701324, -0.030754974111914635, 0.005240623373538256, -0.013595675118267536, -0.000685024366248399, -0.003039561677724123, ...
227
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
![image](https://user-images.githubusercontent.com/29654121/118241022-3deae900-b4ce-11eb-964e-2801c04d403d.png) I tried to add color in geojson but sometimes it did not work. Especially when obj->tio.entity->color.index == 256.
how can i get the color &weigth for entitys in geojson
https://api.github.com/repos/LibreDWG/libredwg/issues/341/comments
1
2021-05-14T08:18:05
2021-05-19T01:55:30Z
https://github.com/LibreDWG/libredwg/issues/341
891,720,732
341
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : how can i get the color &weigth for entitys in geojson Issue date: --- start body --- ![image](https://user-images.githubusercontent.com/29654121/118241022-3deae900-b4ce-11eb-964e-2801c04d403d.png) I tried to add color in geojson but sometimes it did not wo...
396
[ -0.026137948036193848, 0.012503346428275108, -0.01629900559782982, 0.003270964603871107, 0.03506891056895256, 0.012823372147977352, 0.040278635919094086, 0.036110855638980865, -0.030127109959721565, -0.00866303313523531, -0.009191447868943214, -0.010464110411703587, -0.009459376335144043, ...
3,054
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Am compiling and installing FFMPEG on Raspberry Pi 4 Have installed all the other depnedenices and then I enter the following: cd ~/ffmpeg_sources && wget -O ffmpeg-snapshot.tar.bz2 https://ffmpeg.org/releases/ffmpeg-snapshot.tar.bz2 && tar xjvf ffmpeg-snapshot.tar.bz2 && cd ffmpeg && PATH="$HOME/bin:$PATH" PKG_CO...
make: *** [ffbuild/common.mak:67: libavfilter/vf_nnedi.o] Error 1
https://api.github.com/repos/gpac/gpac/issues/1682/comments
1
2021-01-20T03:42:19
2021-01-20T08:02:28Z
https://github.com/gpac/gpac/issues/1682
789,600,228
1,682
false
This is a GitHub Issue repo:gpac owner:gpac Title : make: *** [ffbuild/common.mak:67: libavfilter/vf_nnedi.o] Error 1 Issue date: --- start body --- Am compiling and installing FFMPEG on Raspberry Pi 4 Have installed all the other depnedenices and then I enter the following: cd ~/ffmpeg_sources && wget -O ffmpeg-...
2,259
[ -0.0258447527885437, 0.045297201722860336, -0.005789583083242178, 0.02419157139956951, 0.025541670620441437, -0.005252298898994923, 0.0018822172423824668, 0.03579140082001686, -0.008686096407473087, 0.01617363654077053, -0.036094486713409424, -0.012660622596740723, -0.013363225385546684, 0...
1,802
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
When trying to encapsulate H.266/VVC content into an MPEG-TS file, there seems to be 2 problems with the output: 1) Access unit delimiter appears without the stop bit (00 00 00 01 00 a1 **a0**), This appears throughout the stream (Gpac adds aud units to every frame) 2) Stream type seems to be off, according to "ISO/I...
Problem when creating an MPEG-TS file from a VVC content
https://api.github.com/repos/gpac/gpac/issues/1684/comments
2
2021-02-11T08:42:56
2021-02-23T13:43:39Z
https://github.com/gpac/gpac/issues/1684
806,186,321
1,684
false
This is a GitHub Issue repo:gpac owner:gpac Title : Problem when creating an MPEG-TS file from a VVC content Issue date: --- start body --- When trying to encapsulate H.266/VVC content into an MPEG-TS file, there seems to be 2 problems with the output: 1) Access unit delimiter appears without the stop bit (00 00 00 0...
1,422
[ 0.0002682571648620069, 0.03258989378809929, -0.01786726713180542, 0.014603512361645699, 0.0009221494547091424, 0.04666135832667351, -0.03649687021970749, 0.0551423542201519, -0.01404764223843813, 0.014738509431481361, 0.010982412844896317, 0.0014105214504525065, 0.040022674947977066, 0.000...
1,800
CVE-2019-20014
2019-12-27T01:15:13.587000
An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (...
5,103
[ -0.040232520550489426, 0.03121274895966053, -0.007973664440214634, -0.0029232895467430353, 0.05941890925168991, 0.05036814138293266, -0.004068195819854736, 0.04051148518919945, -0.013397925533354282, 0.027198797091841698, -0.012111600488424301, 0.0011972120264545083, -0.0041146897710859776, ...
117
CVE-2019-11598
2019-04-29T16:29:00.470000
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*", "matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1540
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WritePNMImage of coders/pnm.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments
6
2019-04-08T03:10:13
2019-05-12T11:30:48Z
https://github.com/ImageMagick/ImageMagick/issues/1540
430,236,223
1,540
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in WritePNMImage of coders/pnm.c Issue date: --- start body --- ### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [ope...
5,756
[ -0.042944930493831635, 0.014251071028411388, -0.006761270575225353, 0.009375032037496567, 0.031288448721170425, 0.028834452852606773, -0.01991315558552742, 0.031595200300216675, -0.009272782132029533, 0.036784376949071884, 0.0016264114528894424, -0.00552468653768301, 0.009592312388122082, ...
39
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
overflow of Ap4Array.h in function EnsureCapacity Hi I found an crash erro. System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0.0 commit:0c7705733de80172712e487dd6fdd28387fd7184 [poc.zip](https://github.com/axiomatic-systems/Bento4/files/6469891/poc5.zip) ----------------------...
overflow of Ap4Array.h in function EnsureCapacity
https://api.github.com/repos/axiomatic-systems/Bento4/issues/608/comments
0
2021-05-13T01:46:44
2021-05-27T20:48:15Z
https://github.com/axiomatic-systems/Bento4/issues/608
890,625,921
608
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : overflow of Ap4Array.h in function EnsureCapacity Issue date: --- start body --- overflow of Ap4Array.h in function EnsureCapacity Hi I found an crash erro. System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0.0 commi...
4,198
[ -0.046454962342977524, 0.030740492045879364, -0.007082735188305378, 0.009817801415920258, 0.049059074372053146, -0.005713331513106823, -0.03720587491989136, 0.0492386668920517, -0.0390317440032959, 0.023975787684321404, -0.01698659174144268, 0.016702234745025635, 0.015445076860487461, 0.00...
2,066
CVE-2020-21831
2021-05-17T22:15:07.377000
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_handles ../../src/decode.c:2637.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:241...
1,738
[ -0.017372976988554, 0.02175694890320301, -0.00458021555095911, 0.015343907289206982, 0.05115623027086258, 0.05414799600839615, -0.01749146170914173, 0.04514307901263237, -0.019046587869524956, 0.027696048840880394, -0.011974467895925045, 0.0011904117418453097, 0.01215219683945179, 0.012181...
243
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line .....
Segmentation fault caused by use after free using mp4box in gf_list_count, list.c:642
https://api.github.com/repos/gpac/gpac/issues/1896/comments
1
2021-08-26T10:01:50
2021-08-30T15:35:34Z
https://github.com/gpac/gpac/issues/1896
980,061,803
1,896
false
This is a GitHub Issue repo:gpac owner:gpac Title : Segmentation fault caused by use after free using mp4box in gf_list_count, list.c:642 Issue date: --- start body --- - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downl...
3,920
[ -0.005838816519826651, 0.030534952878952026, -0.01450836006551981, -0.0011821298394352198, 0.021411359310150146, 0.017637057229876518, -0.01688503473997116, 0.04707945138216019, -0.0022684831637889147, 0.023539725691080093, -0.040694352239370346, 0.014685723930597305, 0.03419574350118637, ...
1,662
CVE-2021-35307
2021-08-05T20:15:09.423000
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the AP4_DescriptorFinder::Test component located in /Core/Ap4Descriptor.h. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/616" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6BE318-62B8-44AE-9090-BF24EC5E846C", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-636", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/616
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, A SEGV has occurred when running program mp42aac, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0-636 [poc (2).zip](https://github.com/axiomatic-systems/Bento4/files/6631972/poc.2.zip) Verification steps: 1.Get the source code of Bento4 2.Compile ``` cd Be...
SEGV in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/616/comments
1
2021-06-10T14:10:25
2021-08-06T01:09:22Z
https://github.com/axiomatic-systems/Bento4/issues/616
917,392,735
616
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : SEGV in mp42aac Issue date: --- start body --- Hello, A SEGV has occurred when running program mp42aac, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0-636 [poc (2).zip](https://github.com/axiomatic-systems/Be...
3,217
[ -0.019080501049757004, 0.010675287805497646, 0.0018889473285526037, -0.00650977436453104, 0.022404009476304054, -0.011884511448442936, -0.0491107776761055, 0.04712260514497757, -0.011891929432749748, 0.03065343387424946, -0.04857664182782173, 0.007118095178157091, 0.027463458478450775, 0.0...
285
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
Option 1 (FID/SID): ``` $ gpac -graph \ -i avgen:dur=3.840:sr=48000:ch=2:FID=GEN2 \ ffavf:FID=GEN2A:SID=GEN2#audio::f=aresample=sample_rate=48000 \ reframer:raw:xs=9.6:#ClampDur=9.6:#PStart=9.6:#m=m2:SID=GEN2A,GEN2#video:#BUrl=http://romain \ @ ffenc:c=aac:FID=P1A0 \ @1 ffenc:c=avc:fintra=1...
Issue building a graph with audio resampler located where requested
https://api.github.com/repos/gpac/gpac/issues/1741/comments
2
2021-04-12T09:10:28
2021-04-14T08:55:59Z
https://github.com/gpac/gpac/issues/1741
855,745,922
1,741
false
This is a GitHub Issue repo:gpac owner:gpac Title : Issue building a graph with audio resampler located where requested Issue date: --- start body --- Option 1 (FID/SID): ``` $ gpac -graph \ -i avgen:dur=3.840:sr=48000:ch=2:FID=GEN2 \ ffavf:FID=GEN2A:SID=GEN2#audio::f=aresample=sample_rate=48000 \ r...
3,374
[ -0.017900360748171806, 0.040723320096731186, -0.022241197526454926, 0.01966056227684021, -0.015811985358595848, -0.007402544841170311, -0.026179276406764984, 0.029863767325878143, -0.032638322561979294, 0.0287599116563797, -0.05104586109519005, 0.023404721170663834, 0.024747246876358986, 0...
1,767
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
To reproduce: ``` gpac -graph -logs=dash:filter@info -threads=1 -i https://www.gpac-licensing.com/downloads/tmp/t2/stream.mpd:gpac:forward=mani cecrypt:cfile=DRM.xml @ -o t2-cenc/stream.mpd:pssh=mv ``` PID AS_1 doesn't seem to propagate EOS properly. Bonus: remove the logs and you'll get various errors: ``` ...
dasher pid not emitting EOS -> locking
https://api.github.com/repos/gpac/gpac/issues/1841/comments
4
2021-07-05T20:14:02
2021-07-14T13:21:36Z
https://github.com/gpac/gpac/issues/1841
937,342,694
1,841
false
This is a GitHub Issue repo:gpac owner:gpac Title : dasher pid not emitting EOS -> locking Issue date: --- start body --- To reproduce: ``` gpac -graph -logs=dash:filter@info -threads=1 -i https://www.gpac-licensing.com/downloads/tmp/t2/stream.mpd:gpac:forward=mani cecrypt:cfile=DRM.xml @ -o t2-cenc/stream.mpd:pssh=...
852
[ -0.058180589228868484, 0.03751116991043091, -0.018293075263500214, 0.00981637928634882, -0.014329841360449791, -0.011921598576009274, -0.013867330737411976, 0.04931315407156944, -0.04577255621552467, -0.016602519899606705, 0.004306129179894924, 0.011251755990087986, 0.001334700733423233, -...
1,698
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
## Affected version the lastest version https://github.com/LibreDWG/libredwg/tree/0.12.4.4348 ## What's the problem? A heap-buffer-overflow was discovered in function copy_bytes in decode_r2007.c ASAN report: ``` ================================================================= ==4110248==ERROR: AddressSan...
A heap-buffer-overflow in function copy_bytes in decode_r2007.c
https://api.github.com/repos/LibreDWG/libredwg/issues/391/comments
0
2021-08-30T07:31:07
2022-02-04T22:10:48Z
https://github.com/LibreDWG/libredwg/issues/391
982,483,372
391
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : A heap-buffer-overflow in function copy_bytes in decode_r2007.c Issue date: --- start body --- ## Affected version the lastest version https://github.com/LibreDWG/libredwg/tree/0.12.4.4348 ## What's the problem? A heap-buffer-overflow was discovered ...
4,294
[ -0.04995386302471161, 0.011780883185565472, -0.0051938011310994625, -0.007659397553652525, 0.05643152445554733, 0.011438033543527126, 0.004956724587827921, 0.044905953109264374, 0.013538897037506104, 0.032650917768478394, -0.01101494301110506, -0.006510487757623196, 0.009745671413838863, 0...
3,012
null
null
null
null
null
null
null
null
null
[ "LibreDWG", "libredwg" ]
## Affected version the latest commit: https://github.com/LibreDWG/libredwg/tree/45d2a290c65ed691be0901ba2b2ef51044e07a16 and 0.12.4 ## What's the problem? A heap buffer overflow was discovered in dxf_tables_read in in_dxf.c:11968. ASAN report: ``` ==2899325==ERROR: AddressSanitizer: heap-buffer-ove...
Heap-buffer-overflow in dxf_tables_read in in_dxf.c
https://api.github.com/repos/LibreDWG/libredwg/issues/366/comments
1
2021-06-10T08:31:08
2022-02-05T13:32:50Z
https://github.com/LibreDWG/libredwg/issues/366
917,066,500
366
false
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Heap-buffer-overflow in dxf_tables_read in in_dxf.c Issue date: --- start body --- ## Affected version the latest commit: https://github.com/LibreDWG/libredwg/tree/45d2a290c65ed691be0901ba2b2ef51044e07a16 and 0.12.4 ## What's the problem? A heap b...
3,824
[ -0.04593682289123535, 0.005548469722270966, -0.006076560355722904, 0.009639410302042961, 0.061737287789583206, 0.029235083609819412, -0.001209327019751072, 0.03740288317203522, -0.0014276043511927128, 0.02181365340948105, -0.02213754877448082, -0.014955519698560238, 0.0067032272927463055, ...
3,035
CVE-2019-11255
2019-12-05T16:15:10.567000
Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4054" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4096" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:external-provisioner:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A78A50B-5286-400D-A54A-49F1023D97D6", "versionEndExcluding": null, "versionEndIncluding": "0.4.2", "ver...
https://github.com/kubernetes/kubernetes/issues/85233
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
<!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks! If the matter is security related, please disclose it privately via https://kubernetes.io/security/ --> **Am I vulnerable?** CSI snapsho...
CVE-2019-11255: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation
https://api.github.com/repos/kubernetes/kubernetes/issues/85233/comments
5
2019-11-13T20:57:31
2022-10-14T02:00:55Z
https://github.com/kubernetes/kubernetes/issues/85233
522,468,661
85,233
true
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2019-11255: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation Issue date: --- start body --- <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing...
4,910
[ -0.017337637022137642, -0.024575678631663322, -0.009400391019880772, 0.01012548990547657, 0.03692825883626938, -0.023475082591176033, 0.001430775853805244, 0.02473105676472187, -0.0022141416557133198, 0.03705774247646332, 0.005425294861197472, -0.004755225498229265, -0.01116134598851204, -...
106
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
mp42ts only outputs a PAT and PMT once at the beginning of the stream. While the ISO/IEC 13818-1 which defines MPEG-2 TS does not define a repetition rate for PSI information (PAT, PMT) there are industry guidelines on repetition rates for this information: TR 101 290 standard defines an error should be generated if ...
mp42ts : PSI information not repeated
https://api.github.com/repos/axiomatic-systems/Bento4/issues/591/comments
4
2021-03-21T15:46:56
2023-05-29T18:13:15Z
https://github.com/axiomatic-systems/Bento4/issues/591
837,112,139
591
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : mp42ts : PSI information not repeated Issue date: --- start body --- mp42ts only outputs a PAT and PMT once at the beginning of the stream. While the ISO/IEC 13818-1 which defines MPEG-2 TS does not define a repetition rate for PSI information (PAT, P...
961
[ -0.019873544573783875, 0.028369445353746414, -0.020336413756012917, 0.027369050309062004, 0.01458040252327919, 0.01945546828210354, -0.037985194474458694, 0.060710616409778595, -0.024651555344462395, 0.05216991901397705, 0.029772987589240074, 0.009966634213924408, 0.03885120898485184, -0.0...
2,081
CVE-2021-30022
2021-04-19T20:15:14.647000
There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1720
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a integer overflow in `media_tools/av_parsers.c:5349`, function `gf_avc_read_pps_bs_internal`. Below code: `pps_id = gf_bs_read_ue_log(bs, "pps_id"); if (pps_id >= 255) { return -1; } pps = &avc->pps[pps_id]; pps->id = pps_id; ` pps_id may be a negative number, so will not return. However, avc->...
A Integer Overflow in function gf_avc_read_pps_bs_internal
https://api.github.com/repos/gpac/gpac/issues/1720/comments
1
2021-03-29T05:34:17
2021-03-29T07:46:46Z
https://github.com/gpac/gpac/issues/1720
842,986,600
1,720
true
This is a GitHub Issue repo:gpac owner:gpac Title : A Integer Overflow in function gf_avc_read_pps_bs_internal Issue date: --- start body --- There is a integer overflow in `media_tools/av_parsers.c:5349`, function `gf_avc_read_pps_bs_internal`. Below code: `pps_id = gf_bs_read_ue_log(bs, "pps_id"); if (pps_id >= ...
1,016
[ -0.034695301204919815, 0.04804191738367081, -0.010593139566481113, 0.010519320145249367, 0.05566012114286423, 0.023002246394753456, -0.014166017062962055, 0.043819427490234375, -0.016269881278276443, 0.009596572257578373, -0.015177348628640175, -0.013767390511929989, 0.04759899899363518, 0...
211
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
The string generated from the call to AP4_ByteStream::ReadNullTerminatedString has an extra null and the string length has + 1 in length. It is because of this logic ``` AP4_DataBuffer buffer; unsigned int size = 0; AP4_UI08 c = 0; do { AP4_Result result = ReadUI08(c); i...
String length not set correctly in AP4_ByteStream::ReadNullTerminatedString
https://api.github.com/repos/axiomatic-systems/Bento4/issues/597/comments
1
2021-04-10T18:28:24
2021-04-11T03:33:53Z
https://github.com/axiomatic-systems/Bento4/issues/597
855,128,631
597
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : String length not set correctly in AP4_ByteStream::ReadNullTerminatedString Issue date: --- start body --- The string generated from the call to AP4_ByteStream::ReadNullTerminatedString has an extra null and the string length has + 1 in length. It is b...
867
[ 0.017630048096179962, 0.02247362583875656, -0.006591446697711945, 0.039036933332681656, 0.037999022752046585, 0.007964515127241611, -0.025169307366013527, 0.04096859693527222, -0.028744330629706383, 0.0185382179915905, 0.004519231617450714, 0.04359220340847969, 0.0013622563565149903, 0.020...
2,075
CVE-2019-7582
2019-02-07T18:29:00.240000
The readBytes function in util/read.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/172" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:*:*:*:*:*:*:*:*", "matchCriteriaId": "47C3E495-3E11-4C91-B3B9-C479BF492011", "versionEndExcluding": null, "versionEndIncluding": "0.4.8", "versionStartExcludi...
https://github.com/libming/libming/issues/172
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
version: master(**commit 50098023446a5412efcfbd40552821a8cba983a6**) command: **listswf $FILE** OS: **Ubuntu 16.04.4 LTS 64bit** ``` $ ./install-asan/bin/listswf poc >/dev/null header indicates a filesize of 1995 but filesize is 1916 ==19625==WARNING: AddressSanitizer failed to allocate 0xfffffffffffffffe bytes...
Memory allocation failure in readBytes (read.c:252)
https://api.github.com/repos/libming/libming/issues/172/comments
2
2019-01-17T09:17:38
2019-03-09T02:21:54Z
https://github.com/libming/libming/issues/172
400,178,531
172
true
This is a GitHub Issue repo:libming owner:libming Title : Memory allocation failure in readBytes (read.c:252) Issue date: --- start body --- version: master(**commit 50098023446a5412efcfbd40552821a8cba983a6**) command: **listswf $FILE** OS: **Ubuntu 16.04.4 LTS 64bit** ``` $ ./install-asan/bin/listswf poc >/dev/...
2,055
[ -0.02095581591129303, 0.04044472798705101, -0.004827321972697973, 0.00768629414960742, 0.06020306795835495, 0.014197565615177155, -0.009729485958814621, 0.05005446448922157, -0.0069902618415653706, 0.03077511303126812, -0.010066276416182518, 0.009512444026768208, 0.007850946858525276, 0.01...
13
CVE-2020-9467
2020-03-26T20:15:11.427000
Piwigo 2.10.1 has stored XSS via the file parameter in a /ws.php request because of the pwg.images.setInfo function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1168
[ "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
on `file` param. No worry with an admin, but this method can be used by a community user as well. Originally reported by Zak S. see CVE-2020-9467
stored XSS with pwg.images.setInfo
https://api.github.com/repos/Piwigo/Piwigo/issues/1168/comments
1
2020-03-24T13:03:01
2020-03-28T05:54:16Z
https://github.com/Piwigo/Piwigo/issues/1168
586,943,552
1,168
true
This is a GitHub Issue repo:Piwigo owner:Piwigo Title : stored XSS with pwg.images.setInfo Issue date: --- start body --- on `file` param. No worry with an admin, but this method can be used by a community user as well. Originally reported by Zak S. see CVE-2020-9467 --- end body ---
289
[ -0.05366988480091095, 0.005025661084800959, -0.007984506897628307, 0.034792520105838776, 0.06436077505350113, 0.017867520451545715, 0.012286445125937462, 0.03710843250155449, 0.000019828723452519625, -0.006483203731477261, 0.009983999654650688, -0.0027652918361127377, -0.03349991887807846, ...
156
CVE-2021-32268
2021-09-20T16:15:09.960000
Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary code. The fixed version is 1.0.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1587
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A heap-buffer-overflow in box_dump.c:350
https://api.github.com/repos/gpac/gpac/issues/1587/comments
0
2020-09-04T15:05:21
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1587
693,270,293
1,587
true
This is a GitHub Issue repo:gpac owner:gpac Title : A heap-buffer-overflow in box_dump.c:350 Issue date: --- start body --- ## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFL...
5,232
[ -0.026392916217446327, 0.04254604130983353, -0.009940383955836296, 0.015254896134138107, 0.02274012379348278, 0.005033816210925579, -0.03122837468981743, 0.04182745888829231, -0.011983850970864296, 0.013690482825040817, -0.01286710798740387, 0.019057393074035645, 0.011983850970864296, 0.00...
329
CVE-2021-32270
2021-09-20T16:15:10.053000
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in box_code_base.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1586" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1586
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in box_code_base.c:11579
https://api.github.com/repos/gpac/gpac/issues/1586/comments
0
2020-09-04T14:58:11
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1586
693,262,344
1,586
true
This is a GitHub Issue repo:gpac owner:gpac Title : A Segmentation fault in box_code_base.c:11579 Issue date: --- start body --- ## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure ...
1,808
[ -0.0038722408935427666, 0.05323769524693489, -0.0052765836007893085, 0.010073818266391754, 0.030034208670258522, 0.002035360550507903, -0.023398220539093018, 0.057611752301454544, -0.008755608461797237, 0.018424976617097855, -0.03316495567560196, 0.015047064051032066, 0.0320265032351017, 0...
331
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
pl.m3u: ``` avgen:dur=0.5:sr=48000:ch=2 avgen:dur=24:sr=48000:ch=2 ``` ``` $ gpac -threads=-1 -graph -i pl.m3u @#audio enc:c=aac @ reframer:xs=1/2:xe=49/2:xround=seek @ -o source1/audio.mpd:stl:segdur=1.5 --template='$Type$_$Number$' No filter chain found for PID video in filter flist to any loaded filters - N...
quickjs random assert with avgen from playlist
https://api.github.com/repos/gpac/gpac/issues/1825/comments
2
2021-06-11T14:26:43
2021-07-07T15:00:12Z
https://github.com/gpac/gpac/issues/1825
918,820,962
1,825
false
This is a GitHub Issue repo:gpac owner:gpac Title : quickjs random assert with avgen from playlist Issue date: --- start body --- pl.m3u: ``` avgen:dur=0.5:sr=48000:ch=2 avgen:dur=24:sr=48000:ch=2 ``` ``` $ gpac -threads=-1 -graph -i pl.m3u @#audio enc:c=aac @ reframer:xs=1/2:xe=49/2:xround=seek @ -o source1/a...
584
[ -0.027278834953904152, 0.010130359791219234, -0.012137758545577526, -0.008877680636942387, -0.012806891463696957, -0.018969137221574783, -0.02032296545803547, 0.052285727113485336, -0.03348776325583458, 0.03719133511185646, -0.04067705199122429, 0.023139547556638718, 0.03060893714427948, 0...
1,710
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
hello fellas... I have an encrypted mp4 file vid_enc,mp4 i get return 3 keys xxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx i know the mannual method to decry...
Decrypt mp4 file using multiple keys...
https://api.github.com/repos/axiomatic-systems/Bento4/issues/596/comments
1
2021-04-09T23:00:55
2023-11-26T17:50:00Z
https://github.com/axiomatic-systems/Bento4/issues/596
854,909,895
596
false
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Decrypt mp4 file using multiple keys... Issue date: --- start body --- hello fellas... I have an encrypted mp4 file vid_enc,mp4 i get return 3 keys xxxxxxxxxxxxxxxxxxxxxxxxxxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxx:x...
1,048
[ -0.01715184934437275, 0.025632889941334724, -0.013546311296522617, -0.019910741597414017, -0.004138339776545763, -0.0037953027058392763, -0.008400756865739822, 0.0646953135728836, -0.03369060903787613, 0.07491343468427658, 0.01818825863301754, -0.02020268887281418, -0.03538389876484871, 0....
2,076
null
null
null
null
null
null
null
null
null
[ "strukturag", "libde265" ]
When I run enc265 binary with the main sample file paris_cif.yuv (or other one...) the execution stop at an assert : `enc265: libde265/libde265/encoder/encoder-syntax.cc:200: void encode_part_mode(encoder_context*, CABAC_encoder*, PredMode, PartMode, int): Assertion 'PartMode==PART_Nx2N' failed.` And when I remov...
Encoder sample crash / assert
https://api.github.com/repos/strukturag/libde265/issues/303/comments
0
2021-07-23T14:45:49
2021-07-23T14:45:49Z
https://github.com/strukturag/libde265/issues/303
951,645,267
303
false
This is a GitHub Issue repo:libde265 owner:strukturag Title : Encoder sample crash / assert Issue date: --- start body --- When I run enc265 binary with the main sample file paris_cif.yuv (or other one...) the execution stop at an assert : `enc265: libde265/libde265/encoder/encoder-syntax.cc:200: void encode_part_m...
646
[ -0.0019549517892301083, 0.04245460405945778, -0.008233710192143917, 0.0030820979736745358, 0.024390703067183495, 0.02171511761844158, -0.019143005833029747, 0.04943182319402695, -0.020236892625689507, 0.03884773701429367, -0.021670769900083542, -0.000285482092294842, 0.025159379467368126, ...
3,137
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
I'm trying to compile a static build of MP4Box by using the following: `git clone https://github.com/gpac/gpac.git gpac cd gpac ./configure --static-mp4box --enable-static-bin --use-zlib=no make -j4` However, the resulting MP4Box binary is still dynamically linked to some libraries: ` file bin/gcc/MP4Box bin/gcc...
Failed to build statically linked MP4Box
https://api.github.com/repos/gpac/gpac/issues/1685/comments
13
2021-02-12T20:08:23
2021-03-05T11:02:40Z
https://github.com/gpac/gpac/issues/1685
807,514,952
1,685
false
This is a GitHub Issue repo:gpac owner:gpac Title : Failed to build statically linked MP4Box Issue date: --- start body --- I'm trying to compile a static build of MP4Box by using the following: `git clone https://github.com/gpac/gpac.git gpac cd gpac ./configure --static-mp4box --enable-static-bin --use-zlib=no m...
3,200
[ -0.005683198571205139, 0.011115318164229393, -0.014101117849349976, -0.008143090642988682, 0.030482301488518715, -0.010206006467342377, -0.01817266270518303, 0.05439584329724312, -0.01499685738235712, 0.02225778065621853, -0.02757793292403221, -0.0002531992213334888, 0.0072269923985004425, ...
1,799
CVE-2019-11221
2019-04-15T12:31:36.477000
GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1203" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1203
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a buffer overflow issue in gf_import_message () function, media_import.c szMsg overflow when srt file contains more than one txt line and the line is long enough. GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...) { if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARN...
buffer overflow issue 6#
https://api.github.com/repos/gpac/gpac/issues/1203/comments
6
2019-02-12T03:44:32
2019-04-19T09:00:55Z
https://github.com/gpac/gpac/issues/1203
409,106,668
1,203
true
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 6# Issue date: --- start body --- There is a buffer overflow issue in gf_import_message () function, media_import.c szMsg overflow when srt file contains more than one txt line and the line is long enough. GF_Err gf_import_message(GF_Media...
3,728
[ -0.021296745166182518, 0.036922577768564224, -0.010070494376122952, 0.0008591125370003283, 0.04444269835948944, 0.013930721208453178, -0.02390104904770851, 0.04200790449976921, -0.04610699042677879, -0.007639552000910044, -0.013930721208453178, 0.020464599132537842, 0.016442567110061646, 0...
30
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
https://github.com/gpac/gpac/blob/4a8000c4595bcff82fe54afc4f6a515c2e1322ba/src/media_tools/media_import.c#L346-L352 The `origin_esd->decoderConfig` is not checked before referenced.
Possible null pointer dereference in gf_import_isomedia_track()
https://api.github.com/repos/gpac/gpac/issues/1808/comments
0
2021-05-26T06:31:02
2021-05-26T15:37:13Z
https://github.com/gpac/gpac/issues/1808
901,835,279
1,808
false
This is a GitHub Issue repo:gpac owner:gpac Title : Possible null pointer dereference in gf_import_isomedia_track() Issue date: --- start body --- https://github.com/gpac/gpac/blob/4a8000c4595bcff82fe54afc4f6a515c2e1322ba/src/media_tools/media_import.c#L346-L352 The `origin_esd->decoderConfig` is not checked before...
350
[ -0.018212849274277687, 0.03698139265179634, -0.017170924693346024, -0.0008040188113227487, -0.03837062418460846, 0.0007892581634223461, -0.04245496913790703, 0.029840731993317604, -0.015017611905932426, 0.00989134144037962, -0.02114413119852543, 0.017240386456251144, 0.02097742259502411, 0...
1,726
CVE-2020-13597
2020-06-03T17:15:24.887000
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "psirt@tigera.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91507" }, { "source": "psirt@tigera.io", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "95DB38FE-A03E-456B-874A-A58C31BE7592", "versionEndExcluding": null, "versionEndIncluding": "2.6.2", "versi...
https://github.com/kubernetes/kubernetes/issues/91507
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) (6.0 Medium) A cluster configured to use an affected container networking implementation is susceptible to man-in-the-middle (MitM) attacks. By sending “rogue” router ad...
CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements
https://api.github.com/repos/kubernetes/kubernetes/issues/91507/comments
7
2020-05-27T19:32:29
2022-09-14T11:48:50Z
https://github.com/kubernetes/kubernetes/issues/91507
625,973,443
91,507
true
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements Issue date: --- start body --- CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:...
5,770
[ -0.023163268342614174, -0.05530156195163727, -0.007460675667971373, -0.0007270919159054756, 0.027517488226294518, -0.01994943991303444, -0.007386624347418547, 0.019727284088730812, 0.003617409383878112, 0.019312597811222076, -0.017564985901117325, -0.004942928906530142, 0.02643634006381035, ...
167
CVE-2019-17452
2019-10-10T17:15:17.780000
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListInspector::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::InspectFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4dump.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/434" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/434
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 File Dumper - Version 1.2 (Bento4 Version 1.5.1.0) **Command** mp4dump --verbosity 2 POC-file **ASAN Output** ``` ASAN:DEADLYSIGNAL ================================================================= ==12343==ERROR: AddressSanitize...
SEGV in mp4dump
https://api.github.com/repos/axiomatic-systems/Bento4/issues/434/comments
4
2019-09-29T17:37:28
2022-02-28T03:29:23Z
https://github.com/axiomatic-systems/Bento4/issues/434
499,946,487
434
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : SEGV in mp4dump Issue date: --- start body --- **System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 File Dumper - Version 1.2 (Bento4 Version 1.5.1.0) **Command** mp4dump --verbosity 2 POC-file **ASAN Output** ``` AS...
2,314
[ -0.023939132690429688, 0.032139040529727936, -0.003963527735322714, -0.0029726456850767136, 0.025777289643883705, 0.0027698022313416004, -0.04695918783545494, 0.05120992660522461, -0.004954409785568714, 0.03032960370182991, -0.03386231139302254, -0.003687086049467325, 0.014461131766438484, ...
96
CVE-2020-21843
2021-05-17T22:15:07.437000
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_read_RC ../../src/bits.c:318.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:241...
1,738
[ -0.017635544762015343, 0.021618720144033432, -0.0045865741558372974, 0.01542925089597702, 0.05105571821331978, 0.0540764145553112, -0.017472663894295692, 0.044955093413591385, -0.018731288611888885, 0.027808189392089844, -0.011712607927620411, 0.0010781596647575498, 0.012090194970369339, 0...
245
null
null
null
null
null
null
null
null
null
[ "jerryscript-project", "jerryscript" ]
<!-- First of all, when reporting a bug, give the issue a descriptive title. In the body of the issue, optionally give a free-form text description of the bug. Give the context necessary for others to understand the problem. Then, provide information necessary to reproduce the bug. Omit sections that are irrel...
ubsan: jerryscript/jerry-core/ecma/base/ecma-helpers-number.c:700:51: runtime error: left shift of negative value -8
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4702/comments
0
2021-06-30T09:24:46
2021-12-23T10:33:23Z
https://github.com/jerryscript-project/jerryscript/issues/4702
933,487,858
4,702
false
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : ubsan: jerryscript/jerry-core/ecma/base/ecma-helpers-number.c:700:51: runtime error: left shift of negative value -8 Issue date: --- start body --- <!-- First of all, when reporting a bug, give the issue a descriptive title. In the body of t...
4,035
[ -0.007984700612723827, -0.011232235468924046, 0.0008057063678279519, -0.01577172428369522, 0.03383084386587143, 0.008478890173137188, 0.001353727886453271, 0.04780936613678932, -0.03326605632901192, 0.01527753472328186, -0.027872322127223015, 0.018214436247944832, -0.003664066782221198, 0....
2,269
CVE-2020-22150
2021-07-21T17:15:08.167000
A cross site scripting (XSS) vulnerability in /admin.php?page=permalinks of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1158
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team! I found a XSS in XSS in /admin.php?page=permalinks Exploit Request: ``` POST /piwigo/piwigo/admin.php?page=permalinks HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9...
XSS in /admin.php?page=permalinks
https://api.github.com/repos/Piwigo/Piwigo/issues/1158/comments
3
2020-02-12T03:32:27
2021-12-07T11:25:28Z
https://github.com/Piwigo/Piwigo/issues/1158
563,727,063
1,158
true
This is a GitHub Issue repo:Piwigo owner:Piwigo Title : XSS in /admin.php?page=permalinks Issue date: --- start body --- Hi team! I found a XSS in XSS in /admin.php?page=permalinks Exploit Request: ``` POST /piwigo/piwigo/admin.php?page=permalinks HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Window...
1,031
[ -0.03350627049803734, 0.006538517773151398, -0.003890417981892824, 0.02349507436156273, 0.07764852792024612, 0.015489022247493267, 0.02185317873954773, 0.039202045649290085, -0.013367636129260063, -0.013912512920796871, -0.003868622938171029, 0.005209018941968679, -0.019441192969679832, -0...
275
null
null
null
null
null
null
null
null
null
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision e191a5cf47eeaf3e36098e49a138885f913c0dd1 (latest master - 2021.01.29.) ###### Build platform Ubuntu 16.04.1 (Linux 4.15.0-117-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fn...
Uncaught RangeError causes stack overflow
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4554/comments
4
2021-01-30T04:18:28
2021-02-01T11:37:57Z
https://github.com/jerryscript-project/jerryscript/issues/4554
797,331,128
4,554
false
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : Uncaught RangeError causes stack overflow Issue date: --- start body --- ###### JerryScript revision e191a5cf47eeaf3e36098e49a138885f913c0dd1 (latest master - 2021.01.29.) ###### Build platform Ubuntu 16.04.1 (Linux 4.15.0-117-generic x8...
5,403
[ -0.03946055471897125, -0.013694274239242077, -0.009032082743942738, 0.01077857706695795, 0.0026398380286991596, -0.0185026153922081, -0.02659933641552925, 0.03452067822217941, -0.053987886756658554, 0.008367098867893219, -0.010705502703785896, 0.017961859703063965, 0.008549787104129791, 0....
2,293
CVE-2020-21838
2021-05-17T21:15:07.493000
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_appinfo ../../src/decode.c:2842.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://libredwg.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492816
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:241...
1,738
[ -0.01740359514951706, 0.021769294515252113, -0.004561784211546183, 0.01534653827548027, 0.05117486044764519, 0.05413465574383736, -0.01749238930642605, 0.04513687640428543, -0.019031483680009842, 0.02770368382334709, -0.011979770846664906, 0.0011811433359980583, 0.012186956591904163, 0.012...
239
CVE-2020-23321
2021-06-10T23:15:08.197000
There is a heap-buffer-overflow at lit-strings.c:431 in lit_read_code_unit_from_utf8 in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3870" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3870
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
heap-buffer-overflow in lit_read_code_unit_from_utf8
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3870/comments
0
2020-06-06T14:03:56
2020-06-08T09:09:09Z
https://github.com/jerryscript-project/jerryscript/issues/3870
632,483,470
3,870
true
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : heap-buffer-overflow in lit_read_code_unit_from_utf8 Issue date: --- start body --- ###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py -...
5,858
[ -0.0248884130269289, -0.0019125316757708788, -0.0005018119118176401, -0.006848684977740049, 0.009610016830265522, 0.010003451257944107, -0.013668227009475231, 0.03371884673833847, -0.03607945516705513, 0.004677506163716316, -0.007191119249910116, 0.009012578055262566, -0.018943171948194504, ...
260
CVE-2020-21842
2021-05-17T22:15:07.407000
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_revhistory ../../src/decode.c:3051.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
true
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : Several bugs found by fuzzing Issue date: --- start body --- Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:241...
1,738
[ -0.017580561339855194, 0.021801086142659187, -0.004484306555241346, 0.015574326738715172, 0.05088406056165695, 0.05459931120276451, -0.017342785373330116, 0.0450882725417614, -0.019051801413297653, 0.02816159278154373, -0.012178588658571243, 0.0009311345056630671, 0.011881369166076183, 0.0...
244
CVE-2019-8382
2019-02-17T02:29:00.597000
An issue was discovered in Bento4 1.5.1-628. A NULL pointer dereference occurs in the function AP4_List:Find located in Core/Ap4List.h when called from Core/Ap4Movie.cpp. It can be triggered by sending a crafted file to the mp4dump binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/364" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/364
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**Description** - we observed a NULL pointer dereference occured in function AP4_List<AP4_Track>: Find () located in Ap4List.h.The same be triggered by sending a crafted file to the mp4dump binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. **Comm...
NULL POINTER DEREFERENCE in AP4_List<AP4_Track>: Find ()
https://api.github.com/repos/axiomatic-systems/Bento4/issues/364/comments
0
2019-02-01T10:30:07
2019-02-01T10:30:07Z
https://github.com/axiomatic-systems/Bento4/issues/364
405,641,344
364
true
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL POINTER DEREFERENCE in AP4_List<AP4_Track>: Find () Issue date: --- start body --- **Description** - we observed a NULL pointer dereference occured in function AP4_List<AP4_Track>: Find () located in Ap4List.h.The same be triggered by sending a cr...
7,451
[ -0.020245516672730446, 0.022175166755914688, -0.00731922872364521, 0.00412818742915988, 0.029988670721650124, 0.0018515553092584014, -0.03618885949254036, 0.03098512999713421, -0.01725613884627819, 0.038782816380262375, -0.0019227309385314584, 0.023835932835936546, 0.03406940773129463, 0.0...
19
CVE-2020-19751
2021-09-07T20:15:07.443000
An issue was discovered in gpac 0.8.0. The gf_odf_del_ipmp_tool function in odf_code.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1272
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [✔ ] I looked for a similar issue and couldn't find any. - [✔ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ✔] I give enough i...
in odf_code.c line3295 have a heap-buffer-overflow
https://api.github.com/repos/gpac/gpac/issues/1272/comments
1
2019-07-08T12:35:13
2019-07-09T16:32:53Z
https://github.com/gpac/gpac/issues/1272
465,232,934
1,272
true
This is a GitHub Issue repo:gpac owner:gpac Title : in odf_code.c line3295 have a heap-buffer-overflow Issue date: --- start body --- Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [✔ ] I looked for a similar issue and couldn't find any. - [✔ ]...
3,950
[ -0.02056712843477726, 0.033783383667469025, -0.007423615548759699, 0.01261134073138237, 0.03353835642337799, 0.00614869873970747, -0.006703842431306839, 0.04536100849509239, -0.02502359449863434, 0.028438687324523926, -0.021761644631624222, -0.0007748087518848479, 0.02219044603407383, 0.01...
301
CVE-2019-11243
2019-04-22T15:29:00.790000
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credenti...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108053" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/7...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113", "versionEndExcluding": null, "versionEndIncluding": "1.12.4", "versionStart...
https://github.com/kubernetes/kubernetes/issues/76797
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service acc...
CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()
https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments
2
2019-04-18T21:31:53
2022-05-16T21:59:22Z
https://github.com/kubernetes/kubernetes/issues/76797
434,967,981
76,797
true
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig() Issue date: --- start body --- CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N The `rest.An...
1,845
[ -0.046337153762578964, -0.02028723992407322, -0.007013438735157251, 0.015703292563557625, 0.01597832888364792, -0.026351146399974823, 0.0160962026566267, 0.03892425820231438, 0.013280348852276802, 0.005153666250407696, -0.03934336081147194, -0.017864296212792397, -0.008290395140647888, 0.0...
33