cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 71 | cve_configurations listlengths 1 10 ⌀ | cve_tags listlengths 1 4 ⌀ | issue_owner_repo listlengths 2 2 | type stringclasses 1
value | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 57 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 38 62 | issue_github_id int64 128M 2.29B | issue_number int64 3 125k | issue_embedding listlengths 3.07k 3.07k ⌀ | __index_level_0__ int64 0 1.14k | msg stringlengths 175 88.8k | n_tokens int64 175 88.8k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-49553 | 2024-01-02T23:15:12.333 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/253"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"Exploit",
"Vendor Advisory"
] | [
"cesanta",
"mjs"
] | Issue | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | SegFaultOnPc in mjs_destroy() at mjs.c:7563 | https://api.github.com/repos/cesanta/mjs/issues/253/comments | 0 | 2023-11-19T09:05:58Z | 2023-12-22T02:22:19Z | https://github.com/cesanta/mjs/issues/253 | 2,000,763,687 | 253 | [
-0.015559551306068897,
-0.00648195156827569,
-0.0017845084657892585,
0.024407701566815376,
0.02548324689269066,
0.019675303250551224,
-0.007629199419170618,
0.03711347281932831,
-0.01621921919286251,
0.028595156967639923,
-0.027333185076713562,
0.002549041761085391,
-0.0014806670369580388,
... | 1,100 | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : SegFaultOnPc in mjs_destroy() at mjs.c:7563
Issue date:
--- start body ---
**The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc69... | 3,112 |
CVE-2023-49554 | 2024-01-03T00:15:08.987 | Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/249"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"yasm",
"yasm"
] | Issue | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389 | https://api.github.com/repos/yasm/yasm/issues/249/comments | 0 | 2023-11-20T14:16:57Z | 2024-01-03T11:22:46Z | https://github.com/yasm/yasm/issues/249 | 2,002,305,193 | 249 | [
-0.04197276011109352,
0.023172760382294655,
-0.005476740188896656,
-0.0013377198483794928,
0.05592532083392143,
0.020655546337366104,
0.007159678265452385,
0.039757609367370605,
0.0039052790962159634,
0.02901269868016243,
-0.025215299800038338,
0.007860902696847916,
0.021187756210565567,
-... | 1,101 | This is a GitHub Issue
repo:yasm
owner:yasm
Title : heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389
Issue date:
--- start body ---
**The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/... | 6,008 |
CVE-2023-49555 | 2024-01-03T00:15:09.047 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/248"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"yasm",
"yasm"
] | Issue | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357 | https://api.github.com/repos/yasm/yasm/issues/248/comments | 2 | 2023-11-20T14:03:30Z | 2024-01-04T10:06:59Z | https://github.com/yasm/yasm/issues/248 | 2,002,278,782 | 248 | [
-0.01620679721236229,
0.039411984384059906,
-0.00479191355407238,
0.01459178514778614,
0.06131383031606674,
0.02295018546283245,
-0.007713812403380871,
0.044285356998443604,
-0.026746883988380432,
0.030855249613523483,
-0.04731705039739609,
0.015087622217833996,
0.02831939607858658,
0.0155... | 1,102 | This is a GitHub Issue
repo:yasm
owner:yasm
Title : SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357
Issue date:
--- start body ---
**The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9d... | 2,833 |
CVE-2023-49556 | 2024-01-03T00:15:09.090 | Buffer Overflow vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/250"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"Exploit",
"Vendor Advisory"
] | [
"yasm",
"yasm"
] | Issue | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019 | https://api.github.com/repos/yasm/yasm/issues/250/comments | 1 | 2023-11-20T14:26:40Z | 2024-02-12T16:51:53Z | https://github.com/yasm/yasm/issues/250 | 2,002,324,400 | 250 | [
-0.0400124154984951,
0.04272465035319328,
-0.0024798051454126835,
-0.002981358440592885,
0.042472999542951584,
0.029722711071372032,
-0.0031316496897488832,
0.03662911802530289,
-0.000019673841961775906,
0.03363727405667305,
-0.03587416559457779,
0.01971261575818062,
0.011037667281925678,
... | 1,103 | This is a GitHub Issue
repo:yasm
owner:yasm
Title : heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019
Issue date:
--- start body ---
**The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/... | 5,995 |
CVE-2023-49557 | 2024-01-03T00:15:09.147 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/253"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"Exploit",
"Vendor Advisory"
] | [
"yasm",
"yasm"
] | Issue | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | SEGV in yasm_section_bcs_first() at libyasm/section.c:619 | https://api.github.com/repos/yasm/yasm/issues/253/comments | 1 | 2023-11-26T08:48:59Z | 2024-01-03T11:22:18Z | https://github.com/yasm/yasm/issues/253 | 2,010,956,429 | 253 | [
0.014690331183373928,
0.029125671833753586,
-0.005142324138432741,
0.010086322203278542,
0.051763229072093964,
0.004363184329122305,
-0.009604671970009804,
0.03782370686531067,
-0.004472971893846989,
0.04536011442542076,
-0.04700339213013649,
0.014102434739470482,
0.029465658590197563,
0.0... | 1,104 | This is a GitHub Issue
repo:yasm
owner:yasm
Title : SEGV in yasm_section_bcs_first() at libyasm/section.c:619
Issue date:
--- start body ---
**The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddb... | 3,888 |
CVE-2023-49558 | 2024-01-03T00:15:09.203 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/252"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"yasm",
"yasm"
] | Issue | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013 | https://api.github.com/repos/yasm/yasm/issues/252/comments | 3 | 2023-11-26T04:38:16Z | 2024-03-23T09:32:24Z | https://github.com/yasm/yasm/issues/252 | 2,010,889,074 | 252 | [
-0.02080458588898182,
0.033124931156635284,
-0.005848664324730635,
0.010703301057219505,
0.05714960768818855,
0.027090761810541153,
-0.027258766815066338,
0.03995712473988533,
-0.013769387267529964,
0.029260823503136635,
-0.03794106841087341,
0.015176426619291306,
0.0339929573237896,
0.017... | 1,105 | This is a GitHub Issue
repo:yasm
owner:yasm
Title : SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013
Issue date:
--- start body ---
**The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/comm... | 3,441 |
CVE-2023-46929 | 2024-01-03T19:15:08.390 | An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2662"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"Exploit",
"Vendor Advisory"
] | [
"gpac",
"gpac"
] | Issue | # SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please... | SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 | https://api.github.com/repos/gpac/gpac/issues/2662/comments | 0 | 2023-10-24T08:09:10Z | 2023-10-26T10:37:04Z | https://github.com/gpac/gpac/issues/2662 | 1,958,731,817 | 2,662 | [
-0.02351541630923748,
0.02427692525088787,
-0.007771205622702837,
0.0037047441583126783,
0.02442922815680504,
-0.003369679907336831,
-0.04456354305148125,
0.05342751368880272,
-0.01546625979244709,
0.023637257516384125,
-0.03091728873550892,
0.03368918597698212,
0.03682660311460495,
0.0011... | 1,106 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
Issue date:
--- start body ---
# SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872... | 2,870 |
CVE-2023-50120 | 2024-01-10T09:15:44.290 | MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2698"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"Exploit",
"Issue Tracking"
] | [
"gpac",
"gpac"
] | Issue | 1.Version
MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-... | Infinite loop in av1_uvlc media_tools/av_parsers.c:1664 | https://api.github.com/repos/gpac/gpac/issues/2698/comments | 1 | 2023-12-01T04:51:55Z | 2023-12-01T10:00:42Z | https://github.com/gpac/gpac/issues/2698 | 2,020,058,777 | 2,698 | [
-0.033286262303590775,
0.028416605666279793,
-0.010864266194403172,
0.014639792032539845,
0.020973429083824158,
0.017629390582442284,
-0.030080920085310936,
0.04126880317926407,
0.004326443653553724,
0.020279964432120323,
-0.022252483293414116,
0.029618609696626663,
0.0330088771879673,
-0.... | 1,107 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Infinite loop in av1_uvlc media_tools/av_parsers.c:1664
Issue date:
--- start body ---
1.Version
MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your resea... | 2,640 |
CVE-2024-22749 | 2024-01-25T16:15:09.010 | GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/issues/2713"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hanxuer/crashes... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | [
"Exploit",
"Issue Tracking",
"Patch"
] | [
"gpac",
"gpac"
] | Issue | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough inf... | buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577 | https://api.github.com/repos/gpac/gpac/issues/2713/comments | 1 | 2024-01-06T06:07:11Z | 2024-01-08T10:22:24Z | https://github.com/gpac/gpac/issues/2713 | 2,068,418,306 | 2,713 | [
-0.031427569687366486,
0.024526244029402733,
-0.011535070836544037,
0.016472171992063522,
0.029789453372359276,
0.020552296191453934,
-0.021947728469967842,
0.05542294308543205,
-0.026149192824959755,
0.02887938730418682,
-0.02850019372999668,
0.01020030863583088,
0.041680965572595596,
0.0... | 1,108 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577
Issue date:
--- start body ---
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a... | 4,828 |
CVE-2024-22927 | 2024-02-01T23:15:10.960 | Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/57"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | [
"weng-xianhu",
"eyoucms"
] | Issue | ### **Summary**
EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form.
Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali... | EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities | https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments | 1 | 2024-01-05T08:05:47Z | 2024-03-22T01:36:04Z | https://github.com/weng-xianhu/eyoucms/issues/57 | 2,066,903,491 | 57 | [
-0.040661998093128204,
0.007006400730460882,
-0.012313023209571838,
0.015115584246814251,
0.0817883238196373,
0.006061158608645201,
0.008764219470322132,
0.01719677448272705,
-0.00969287846237421,
0.016997776925563812,
0.02668236382305622,
0.005754369311034679,
0.010546913370490074,
-0.020... | 1,109 | This is a GitHub Issue
repo:eyoucms
owner:weng-xianhu
Title : EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities
Issue date:
--- start body ---
### **Summary**
EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form.
Multiple refl... | 5,000 |
CVE-2024-24267 | 2024-02-05T18:15:52.427 | gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2571"
},
{
"source": "cve@mitre.org",
"tags": [
"Ex... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | null | [
"gpac",
"gpac"
] | Issue | Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447)
The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center).
Dynamic memory is allocated [here](https://github... | Memory leak in function gf_fileio_from_mem | https://api.github.com/repos/gpac/gpac/issues/2571/comments | 0 | 2023-08-29T11:13:38Z | 2023-08-29T13:47:19Z | https://github.com/gpac/gpac/issues/2571 | 1,871,446,973 | 2,571 | [
-0.04677533730864525,
0.008337270468473434,
-0.011563902720808983,
-0.037247028201818466,
-0.002102363621816039,
0.020153816789388657,
-0.006456873379647732,
0.04541827365756035,
-0.02761765941977501,
0.023791899904608727,
-0.006041814107447863,
0.0006243929965421557,
0.019951701164245605,
... | 1,110 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Memory leak in function gf_fileio_from_mem
Issue date:
--- start body ---
Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447)
The memory leak is reported by a static analy... | 813 |
CVE-2024-24186 | 2024-02-07T14:15:52.870 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/98"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"Exploit",
"Vendor Advisory"
] | [
"pcmacdon",
"jsish"
] | Issue | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback | https://api.github.com/repos/pcmacdon/jsish/issues/98/comments | 0 | 2024-01-14T11:31:14Z | 2024-01-14T11:31:14Z | https://github.com/pcmacdon/jsish/issues/98 | 2,080,689,779 | 98 | [
-0.02638186886906624,
0.0014252443797886372,
-0.001718458835966885,
0.013309704139828682,
0.020784813910722733,
-0.017563167959451675,
0.0006620520143769681,
0.03076152503490448,
-0.030019210651516914,
-0.010407253168523312,
-0.027064798399806023,
0.008833546191453934,
0.008061538450419903,
... | 1,111 | This is a GitHub Issue
repo:jsish
owner:pcmacdon
Title : stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback
Issue date:
--- start body ---
###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20... | 3,133 |
CVE-2024-24188 | 2024-02-07T14:15:52.917 | Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/100"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | [
"pcmacdon",
"jsish"
] | Issue | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | heap-buffer-overflow in ./jsish/src/jsiUtils.c | https://api.github.com/repos/pcmacdon/jsish/issues/100/comments | 0 | 2024-01-20T05:53:20Z | 2024-01-20T05:53:20Z | https://github.com/pcmacdon/jsish/issues/100 | 2,091,916,967 | 100 | [
-0.022208411246538162,
-0.0038599641993641853,
0.0008728493703529239,
0.021220725029706955,
0.039420291781425476,
-0.003694744547829032,
-0.02409663423895836,
0.03053111769258976,
-0.03323272988200188,
0.022949175909161568,
-0.029369134455919266,
-0.0021641943603754044,
0.019216302782297134,... | 1,112 | This is a GitHub Issue
repo:jsish
owner:pcmacdon
Title : heap-buffer-overflow in ./jsish/src/jsiUtils.c
Issue date:
--- start body ---
###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.... | 4,153 |
CVE-2024-24189 | 2024-02-07T14:15:52.967 | Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/101"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"Vendor Advisory"
] | [
"pcmacdon",
"jsish"
] | Issue | ###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
export JSI__SANITIZE=1
make
```
###### Test case
<details><summary>testcase<... | heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar | https://api.github.com/repos/pcmacdon/jsish/issues/101/comments | 0 | 2024-01-20T05:58:02Z | 2024-01-20T05:58:02Z | https://github.com/pcmacdon/jsish/issues/101 | 2,091,919,351 | 101 | [
-0.020732102915644646,
-0.013694331049919128,
0.0028279379475861788,
0.013972909189760685,
0.017726387828588486,
-0.007616921793669462,
-0.01417817734181881,
0.019691098481416702,
-0.03741748631000519,
0.018635433167219162,
-0.02530665323138237,
-0.005578900221735239,
0.010190106928348541,
... | 1,113 | This is a GitHub Issue
repo:jsish
owner:pcmacdon
Title : heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar
Issue date:
--- start body ---
###### Jsish revision
Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f
Version: v3.5.0
###### Build platform
Ubuntu 20.0... | 4,287 |
CVE-2024-25451 | 2024-02-09T15:15:09.143 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/872"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"Exploit",
"Issue Tracking"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | Hi,
Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210.
We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c... | Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments | 2 | 2023-06-12T09:44:14Z | 2024-02-17T17:35:35Z | https://github.com/axiomatic-systems/Bento4/issues/872 | 1,752,341,840 | 872 | [
-0.02937122993171215,
0.005020082928240299,
-0.02078552357852459,
0.014139091596007347,
0.03377867862582207,
0.009290899150073528,
-0.05613325163722038,
0.033584751188755035,
-0.020997080951929092,
0.054370272904634476,
0.022072497755289078,
0.008475521579384804,
0.03515380248427391,
0.011... | 1,114 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640)
Issue date:
--- start body ---
Hi,
Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple progr... | 7,752 |
CVE-2024-25452 | 2024-02-09T15:15:09.193 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/873"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"Exploit",
"Issue Tracking"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | Hi,
There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71.
Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom().
Here is the output of program with address saniti... | Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments | 1 | 2023-06-12T10:03:27Z | 2024-02-20T02:41:04Z | https://github.com/axiomatic-systems/Bento4/issues/873 | 1,752,379,751 | 873 | [
-0.03406800329685211,
-0.0019192930776625872,
-0.015231228433549404,
0.0006776885129511356,
0.026645855978131294,
-0.009638236835598946,
-0.047065552324056625,
0.038095660507678986,
-0.014747558161616325,
0.050407275557518005,
0.0221960861235857,
0.017332997173070908,
0.025590574368834496,
... | 1,115 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640
Issue date:
--- start body ---
Hi,
There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:... | 7,647 |
CVE-2024-25453 | 2024-02-09T15:15:09.240 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bent... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"Exploit",
"Issue Tracking"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | On master compiled on 2017-09-10 (but please confirm if this affects current stable):
```
# mp4compact $FILE out.mp4
ASAN:DEADLYSIGNAL
=================================================================
==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s... | NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments | 0 | 2017-09-15T07:10:24Z | 2017-12-17T00:59:26Z | https://github.com/axiomatic-systems/Bento4/issues/204 | 257,947,117 | 204 | [
-0.003325453493744135,
0.034735873341560364,
-0.005418977700173855,
0.027797767892479897,
0.04338205233216286,
-0.004179490264505148,
-0.04008683189749718,
0.05151429772377014,
-0.018320225179195404,
0.017519094049930573,
-0.02740475907921791,
0.014836057089269161,
0.022854935377836227,
0.... | 1,116 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp)
Issue date:
--- start body ---
On master compiled on 2017-09-10 (but please confirm if this affects current stable):
```
# mp4compact $FILE out.mp4
ASAN:DEADLYSIGNAL
======... | 1,845 |
CVE-2024-25453 | 2024-02-09T15:15:09.240 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/204"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bent... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"Exploit",
"Issue Tracking"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize().
Here is the output of program with address sanitizer attached.
### Bug Report
File:
major brand: isom
minor version: 200
compatible brand: isom
... | NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments | 1 | 2023-06-12T10:08:57Z | 2024-02-17T17:33:31Z | https://github.com/axiomatic-systems/Bento4/issues/874 | 1,752,392,145 | 874 | [
-0.01246784906834364,
0.010809417814016342,
-0.005797105375677347,
0.019264455884695053,
0.01967906393110752,
0.00018659664783626795,
-0.05372132360935211,
0.0399504229426384,
-0.008381000719964504,
0.03094751015305519,
-0.010387405753135681,
0.014222527854144573,
0.033287081867456436,
0.0... | 1,117 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640
Issue date:
--- start body ---
Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize().
... | 2,992 |
CVE-2024-25454 | 2024-02-09T15:15:09.293 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/875"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"Exploit",
"Issue Tracking"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test().
Here is the output of program with address sanitizer attached.
### Bug Report
File:
major brand: isom
minor version: 200
compatible brand: isom
c... | NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments | 1 | 2023-06-12T10:12:34Z | 2024-02-17T17:30:47Z | https://github.com/axiomatic-systems/Bento4/issues/875 | 1,752,398,555 | 875 | [
-0.004776338115334511,
0.0205055084079504,
-0.005664608906954527,
0.0084461010992527,
0.023486483842134476,
0.005423721857368946,
-0.05880654230713844,
0.033152077347040176,
-0.013391812331974506,
0.03408551216125488,
-0.014137056656181812,
0.009808618575334549,
0.027521342039108276,
0.012... | 1,118 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640
Issue date:
--- start body ---
Hi,
There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test().
... | 4,683 |
CVE-2024-24155 | 2024-02-29T01:44:11.810 | Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/axiomatic-systems/Bento4/issues/919"
}
] | null | null | [
"axiomatic-systems",
"Bento4"
] | Issue | ### Envrionment
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628... | Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks | https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments | 1 | 2024-01-13T21:23:38Z | 2024-02-21T22:47:29Z | https://github.com/axiomatic-systems/Bento4/issues/919 | 2,080,480,764 | 919 | [
-0.026192614808678627,
0.01679377444088459,
-0.017928728833794594,
-0.002063754480332136,
0.01087959948927164,
0.008640725165605545,
-0.04380213841795921,
0.019755296409130096,
-0.016031228005886078,
0.03497077524662018,
0.01044512540102005,
0.03055509552359581,
0.024082308635115623,
0.000... | 1,119 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks
Issue date:
--- start body ---
### Envrionment
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
... | 10,694 |
CVE-2023-46426 | 2024-03-09T06:15:50.637 | Heap-based Buffer Overflow vulnerability in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) via gf_fwrite component in at utils/os_file.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2642"
}
] | null | null | [
"gpac",
"gpac"
] | Issue | # Description
heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657
# Version
```
git log
commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD)
Author: jeanlf <jeanlf@gpac.io>
Date: Thu Oct 12 16:58:53 2023 +0200
./bin/gcc/MP4Box -version
MP4Box - GPAC version 2... | heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 | https://api.github.com/repos/gpac/gpac/issues/2642/comments | 1 | 2023-10-13T09:11:40Z | 2024-03-10T19:44:37Z | https://github.com/gpac/gpac/issues/2642 | 1,941,560,024 | 2,642 | [
-0.049831703305244446,
-0.002920901868492365,
-0.015107816085219383,
0.022128304466605186,
0.04129699245095253,
0.02703232318162918,
-0.02152605727314949,
0.0398515984416008,
-0.02223154716193676,
0.040574293583631516,
0.020115075632929802,
0.015968170017004013,
0.028374474495649338,
-0.00... | 1,120 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657
Issue date:
--- start body ---
# Description
heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657
# Version
```
git log
commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/maste... | 7,129 |
CVE-2023-46427 | 2024-03-09T06:15:50.740 | An issue was discovered in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via null pointer deference in gf_dash_setup_period component in media_tools/dash_client.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2641"
}
] | null | null | [
"gpac",
"gpac"
] | Issue | # Description
Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333
# Version
```
git log
commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD)
Author: jeanlf <jeanlf@gpac.io>
Date: Thu Oct 12 16:58:53 2023 +0200
./bin/gcc/MP4Box -version
... | Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 | https://api.github.com/repos/gpac/gpac/issues/2641/comments | 1 | 2023-10-13T08:54:46Z | 2024-03-10T19:46:45Z | https://github.com/gpac/gpac/issues/2641 | 1,941,533,993 | 2,641 | [
-0.04704863578081131,
0.016906224191188812,
-0.009137483313679695,
0.014161218889057636,
0.02298283763229847,
-0.001406345167197287,
-0.03453442081809044,
0.04382983595132828,
-0.022290946915745735,
0.0027675668243318796,
-0.01944817416369915,
-0.007283664774149656,
0.014537246897816658,
-... | 1,121 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333
Issue date:
--- start body ---
# Description
Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333
# Version
```
git log
commit 7edc40feef23efd8c9948292... | 3,235 |
CVE-2024-28318 | 2024-03-15T15:15:08.977 | gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2764"
}
] | null | null | [
"gpac",
"gpac"
] | Issue | # Description
```
Out of write in swf_get_string at scene_manager/swf_parse.c:325
```
# Version
```
git log
commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD)
Author: Aurelien David <aurelien.david@telecom-paristech.fr>
Date: Mon Feb 26 10:53:25 2024 +0100
./MP4Box... | Out of write in swf_get_string at scene_manager/swf_parse.c:325 | https://api.github.com/repos/gpac/gpac/issues/2764/comments | 0 | 2024-02-27T07:59:08Z | 2024-02-27T13:59:41Z | https://github.com/gpac/gpac/issues/2764 | 2,155,912,726 | 2,764 | [
-0.03485049679875374,
0.02528729848563671,
-0.0033678084146231413,
0.04067423567175865,
0.06326422095298767,
0.025195345282554626,
-0.024873506277799606,
0.04358610883355141,
-0.04870487004518509,
-0.010168558917939663,
0.0044750855304300785,
0.029225986450910568,
0.02591565065085888,
0.00... | 1,122 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Out of write in swf_get_string at scene_manager/swf_parse.c:325
Issue date:
--- start body ---
# Description
```
Out of write in swf_get_string at scene_manager/swf_parse.c:325
```
# Version
```
git log
commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD ->... | 3,404 |
CVE-2024-28319 | 2024-03-15T15:15:09.020 | gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain an out of boundary read vulnerability via gf_dash_setup_period media_tools/dash_client.c:6374 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2763"
}
] | null | null | [
"gpac",
"gpac"
] | Issue | # Description
```
Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374
```
# Version
```
git log
commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD)
Author: Aurelien David <aurelien.david@telecom-paristech.fr>
Date: Mon Feb 26 10:53:25 2024 +0100
./MP... | Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 | https://api.github.com/repos/gpac/gpac/issues/2763/comments | 0 | 2024-02-27T02:31:15Z | 2024-02-27T13:59:40Z | https://github.com/gpac/gpac/issues/2763 | 2,155,523,042 | 2,763 | [
-0.04481612145900726,
0.002722382778301835,
-0.0054998029954731464,
0.01235195156186819,
0.029327040538191795,
-0.010347019881010056,
-0.033399805426597595,
0.04689181596040726,
-0.04236302897334099,
0.00923054851591587,
-0.009254136122763157,
0.003483077511191368,
0.03387155383825302,
-0.... | 1,123 | This is a GitHub Issue
repo:gpac
owner:gpac
Title : Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374
Issue date:
--- start body ---
# Description
```
Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374
```
# Version
```
git log
commit 422b78ecf79ceeee97104d219cc4f184b1348cec (... | 3,352 |
CVE-2023-6597 | 2024-03-19T16:15:08.743 | An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potential... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integri... | [
{
"source": "cna@python.org",
"tags": null,
"url": "http://www.openwall.com/lists/oss-security/2024/03/20/5"
},
{
"source": "cna@python.org",
"tags": null,
"url": "https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a"
},
{
"source": "cna@python.org",
... | null | null | [
"python",
"cpython"
] | Issue | BPO | [46977](https://bugs.python.org/issue46977)
--- | :---
Nosy | @afeblot
<sup>*Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.*</sup>
<details><summary>Show more details</summary><p>
GitHub fields:
```python
assignee = None
closed_at = None
c... | tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks [CVE-2023-6597] | https://api.github.com/repos/python/cpython/issues/91133/comments | 6 | 2022-03-10T17:22:09Z | 2024-05-15T15:20:23Z | https://github.com/python/cpython/issues/91133 | 1,199,076,757 | 91,133 | [
-0.03331015259027481,
-0.034768085926771164,
-0.003768396098166704,
0.01076772902160883,
0.023957114666700363,
0.03575652092695236,
0.05426490306854248,
0.0063506742008030415,
-0.0005061851697973907,
0.018631938844919205,
-0.0044324989430606365,
0.01974392496049404,
-0.03204990178346634,
-... | 1,124 | This is a GitHub Issue
repo:cpython
owner:python
Title : tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks [CVE-2023-6597]
Issue date:
--- start body ---
BPO | [46977](https://bugs.python.org/issue46977)
--- | :---
Nosy | @afeblot
<sup>*Note: these values reflect the state of the i... | 1,599 |
CVE-2024-0450 | 2024-03-19T16:15:09.180 | An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile mo... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cna@python.org",
"tags": null,
"url": "http://www.openwall.com/lists/oss-security/2024/03/20/5"
},
{
"source": "cna@python.org",
"tags": null,
"url": "https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85"
},
{
"source": "cna@python.org",
... | null | null | [
"python",
"cpython"
] | Issue | # Bug report
### Bug description:
Just found this vulnerability in the latest Python 3.11.5 (and previous 3.10.10).
If we craft a zipbomb using the "quoted-overlap" way (as mentioned [https://www.bamsoftware.com/hacks/zipbomb/](https://urldefense.com/v3/__https://www.bamsoftware.com/hacks/zipbomb/__;!!ACWV5N9M2RV99h... | Python "zipfile" can't detect "quoted-overlap" zipbomb that can be used as a DoS attack | https://api.github.com/repos/python/cpython/issues/109858/comments | 12 | 2023-09-25T16:54:41Z | 2024-05-15T15:21:04Z | https://github.com/python/cpython/issues/109858 | 1,911,928,055 | 109,858 | [
-0.03647473827004433,
0.01606975868344307,
-0.0095334742218256,
0.045038141310214996,
0.014544402249157429,
0.02305428311228752,
0.022371886298060417,
0.026827530935406685,
-0.0019635611679404974,
0.011025379411876202,
0.007432764861732721,
-0.005526070017367601,
0.016564829275012016,
-0.0... | 1,125 | This is a GitHub Issue
repo:cpython
owner:python
Title : Python "zipfile" can't detect "quoted-overlap" zipbomb that can be used as a DoS attack
Issue date:
--- start body ---
# Bug report
### Bug description:
Just found this vulnerability in the latest Python 3.11.5 (and previous 3.10.10).
If we craft a zipbomb us... | 2,481 |
CVE-2024-29489 | 2024-03-28T23:15:46.527 | Jerryscript 2.4.0 has SEGV at ./jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/jerryscript-project/jerryscript/commit/cefd391772529c8a9531d7b3c244d78d38be47c6"
},
{
"s... | null | null | [
"jerryscript-project",
"jerryscript"
] | Issue | ###### JerryScript revision
```
$ git show
commit a588e4966175a190ec6350b2a3689d30ed017ec9 (HEAD -> master, origin/master, origin/HEAD)
Author: Máté Tokodi <tokodi.mate.24@gmail.com>
Date: Wed Sep 20 15:38:30 2023 +0200
```
###### Build & Execution platform
```
$ uname -a
Linux user-AYA-NEO-FOUNDER 5.19.0... | SEGV ./jerry-core/ecma/base/ecma-helpers.c:238:58 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5101/comments | 1 | 2023-10-04T12:41:53Z | 2024-03-27T02:29:25Z | https://github.com/jerryscript-project/jerryscript/issues/5101 | 1,926,132,986 | 5,101 | [
-0.02791563607752323,
-0.02278934232890606,
-0.007645850535482168,
0.011673652566969395,
0.030810074880719185,
0.0032562429551035166,
-0.024253997951745987,
0.03923184424638748,
-0.03940620645880699,
0.0358143150806427,
-0.015910692512989044,
0.021969832479953766,
0.02374834194779396,
-0.0... | 1,126 | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : SEGV ./jerry-core/ecma/base/ecma-helpers.c:238:58
Issue date:
--- start body ---
###### JerryScript revision
```
$ git show
commit a588e4966175a190ec6350b2a3689d30ed017ec9 (HEAD -> master, origin/master, origin/HEAD)
Author: Máté Tokodi <tok... | 10,189 |
CVE-2024-31002 | 2024-04-02T08:15:59.863 | Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the AP4 BitReader::ReadCache() at Ap4Utils.cpp component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/axiomatic-systems/Bento4/issues/939"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31002"
}
] | null | null | [
"axiomatic-systems",
"Bento4"
] | Issue | Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
```
=================================================================
==3304149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000160 at pc 0x00000055f635 bp... | Heap-buffer-overflow with ASAN in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/939/comments | 0 | 2024-03-25T01:47:30Z | 2024-03-25T11:23:45Z | https://github.com/axiomatic-systems/Bento4/issues/939 | 2,204,715,905 | 939 | [
-0.02213333360850811,
-0.0017176206456497312,
-0.019634976983070374,
-0.007451086770743132,
0.02860794961452484,
-0.011823211796581745,
-0.04423147812485695,
0.04124048724770546,
-0.007407101336866617,
0.030244197696447372,
-0.0029338104650378227,
0.014717435464262962,
0.02721801958978176,
... | 1,127 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : Heap-buffer-overflow with ASAN in mp42aac
Issue date:
--- start body ---
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
```
================================... | 11,051 |
CVE-2024-31004 | 2024-04-02T08:16:10.720 | An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the Ap4StsdAtom.cpp,AP4_StsdAtom::AP4_StsdAtom,mp4fragment. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/axiomatic-systems/Bento4/issues/941"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31004"
}
] | null | null | [
"axiomatic-systems",
"Bento4"
] | Issue | Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
```
unable to autodetect fragment duration, using default
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1718535==ERROR: Ad... | SEGV ASAN in mp4fragment | https://api.github.com/repos/axiomatic-systems/Bento4/issues/941/comments | 0 | 2024-03-25T11:44:04Z | 2024-03-25T11:44:04Z | https://github.com/axiomatic-systems/Bento4/issues/941 | 2,205,549,858 | 941 | [
-0.013229062780737877,
0.012896984815597534,
-0.010139964520931244,
-0.009143730625510216,
0.030798308551311493,
-0.01356114074587822,
-0.05510950833559036,
0.04222797229886055,
-0.021546458825469017,
0.016063310205936432,
-0.014657770283520222,
0.020527057349681854,
0.015090243890881538,
... | 1,128 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : SEGV ASAN in mp4fragment
Issue date:
--- start body ---
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
```
unable to autodetect fragment duration, using def... | 5,129 |
CVE-2024-30806 | 2024-04-02T18:15:12.397 | An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/axiomatic-systems/Bento4/issues/914"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30806"
}
] | null | null | [
"axiomatic-systems",
"Bento4"
] | Issue | Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
```
=================================================================
==1982814==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000011f at pc 0x0000008aa64d bp... | Heap-buffer-overflow with ASAN in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/914/comments | 0 | 2023-12-28T03:49:43Z | 2024-02-17T18:14:52Z | https://github.com/axiomatic-systems/Bento4/issues/914 | 2,057,955,798 | 914 | [
-0.030684994533658028,
-0.0003192806034348905,
-0.016858015209436417,
-0.01590443029999733,
0.028999192640185356,
-0.01254985574632883,
-0.05077838525176048,
0.03896074742078781,
-0.012337001971900463,
0.03090636245906353,
-0.012898935936391354,
0.010148866102099419,
0.026087353006005287,
... | 1,129 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : Heap-buffer-overflow with ASAN in mp42aac
Issue date:
--- start body ---
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
```
================================... | 6,670 |
CVE-2024-30807 | 2024-04-02T18:15:12.460 | An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_UnknownAtom::~AP4_UnknownAtom at Ap4Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/axiomatic-systems/Bento4/issues/937"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30807"
}
] | null | null | [
"axiomatic-systems",
"Bento4"
] | Issue | Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
**BUG1**
```
=================================================================
==2611989==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000010 at pc 0x0000... | heap-use-after-free with ASAN in mp42ts | https://api.github.com/repos/axiomatic-systems/Bento4/issues/937/comments | 0 | 2024-03-24T11:59:55Z | 2024-03-24T12:44:25Z | https://github.com/axiomatic-systems/Bento4/issues/937 | 2,204,316,177 | 937 | [
-0.014197764918208122,
-0.010408708825707436,
-0.02363009750843048,
0.0062210396863520145,
0.02655026875436306,
-0.005611923988908529,
-0.053960464894771576,
0.03633194789290428,
-0.008218579925596714,
0.039270032197237015,
0.005723894108086824,
0.003699480788782239,
0.024257127195596695,
... | 1,130 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : heap-use-after-free with ASAN in mp42ts
Issue date:
--- start body ---
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems.
To debug a program built with ASan, here is some output
**BUG1**
```
======================... | 14,693 |
CVE-2023-51792 | 2024-04-19T17:15:52.240 | Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of service via the allocation size exceeding the maximum supported size of 0x10000000000. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/strukturag/libde265"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/strukturag/libde265/issues/427"
}
] | null | null | [
"strukturag",
"libde265"
] | Issue | ## Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000
### Description
Libde265 v1.0.12 was discovered that requested allocation size 0xffffffffffff5b00 (0xffffffffffff6b00 after adjustments for alignment, red zones etc.) exceeds maximum supported size of... | Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 | https://api.github.com/repos/strukturag/libde265/issues/427/comments | 2 | 2023-11-03T17:49:11Z | 2023-11-07T07:22:15Z | https://github.com/strukturag/libde265/issues/427 | 1,976,668,054 | 427 | [
-0.02941569872200489,
0.02186926268041134,
-0.0013167760334908962,
0.00908652413636446,
0.05867738649249077,
-0.011912588030099869,
-0.017187392339110374,
0.0527634471654892,
-0.00319953472353518,
0.027721600607037544,
-0.008624497801065445,
0.014723249711096287,
-0.006718637887388468,
0.0... | 1,131 | This is a GitHub Issue
repo:libde265
owner:strukturag
Title : Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000
Issue date:
--- start body ---
## Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000
... | 3,172 |
CVE-2024-3177 | 2024-04-22T23:15:51.180 | A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a se... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "http://www.openwall.com/lists/oss-security/2024/04/16/4"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://github.com/kubernetes/kubernetes/issues/124336"
},
{
"source": "jordan@liggitt.net",
"tags": nul... | null | null | [
"kubernetes",
"kubernetes"
] | Issue | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) - **Low** (2.7)
A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the Servi... | CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin | https://api.github.com/repos/kubernetes/kubernetes/issues/124336/comments | 1 | 2024-04-16T14:04:09Z | 2024-04-18T19:04:58Z | https://github.com/kubernetes/kubernetes/issues/124336 | 2,246,153,626 | 124,336 | [
-0.010574561543762684,
-0.03558867797255516,
-0.0009968254016712308,
-0.005776520352810621,
0.027411388233304024,
-0.009386408142745495,
-0.014537401497364044,
0.02907480299472809,
0.0032254857942461967,
0.013698704540729523,
-0.0015009167836979032,
-0.0021998302545398474,
0.0234136022627353... | 1,132 | This is a GitHub Issue
repo:kubernetes
owner:kubernetes
Title : CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
Issue date:
--- start body ---
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/U... | 3,476 |
CVE-2024-33255 | 2024-04-26T15:15:49.130 | Jerryscript commit cefd391 was discovered to contain an Assertion Failure via ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/jerryscript-project/jerryscript/issues/5135"
}
] | null | null | [
"jerryscript-project",
"jerryscript"
] | Issue | ###### JerryScript revision
cefd391772529c8a9531d7b3c244d78d38be47c6
###### Build platform
Ubuntu 22.04.3
###### Build steps
```sh
python ./tools/build.py --builddir=xxx --debug --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --s... | Assertion ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5135/comments | 0 | 2024-03-26T09:16:48Z | 2024-04-02T14:50:04Z | https://github.com/jerryscript-project/jerryscript/issues/5135 | 2,207,672,144 | 5,135 | [
0.007730433251708746,
0.010248346254229546,
-0.005326636601239443,
0.015372518450021744,
0.012309795245528221,
0.004262781701982021,
0.011868055909872055,
0.025974256917834282,
-0.03734167292714119,
0.0033480138517916203,
-0.00859918724745512,
0.020275821909308434,
0.022028053179383278,
0.... | 1,133 | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : Assertion ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list
Issue date:
--- start body ---
###### JerryScript revision
cefd391772529c8a9531d7b3c244d78d38be47c6
###### Build platform
Ubuntu 22.04.3
###### Build steps
`... | 1,710 |
CVE-2024-33258 | 2024-04-26T15:15:49.180 | Jerryscript commit ff9ff8f was discovered to contain a segmentation violation via the component vm_loop at jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/jerryscript-project/jerryscript/issues/5114"
}
] | null | null | [
"jerryscript-project",
"jerryscript"
] | Issue | ###### JerryScript revision
ff9ff8f36c967890b5ebb240d9fa90d6e351aa01
###### Build platform
Ubuntu 22.04.3
###### Build steps
```sh
python ./tools/build.py --builddir=xxx --clean --debug --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --s... | SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5114/comments | 0 | 2023-11-23T03:57:03Z | 2024-06-18T18:02:50Z | https://github.com/jerryscript-project/jerryscript/issues/5114 | 2,007,446,629 | 5,114 | [
-0.010278626345098019,
-0.00975320115685463,
-0.0055374871008098125,
0.010680905543267727,
0.0256308875977993,
-0.010549549013376236,
-0.01477757841348648,
0.043281883001327515,
-0.02671457827091217,
0.037436529994010925,
-0.0020042089745402336,
0.02280672825872898,
0.03714098036289215,
-0... | 1,134 | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop
Issue date:
--- start body ---
###### JerryScript revision
ff9ff8f36c967890b5ebb240d9fa90d6e351aa01
###### Build platform
Ubuntu 22.04.3
###### Build steps
```sh
python ./tools/bu... | 5,288 |
CVE-2024-33259 | 2024-04-26T15:15:49.250 | Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component scanner_seek at jerry-core/parser/js/js-scanner-util.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/jerryscript-project/jerryscript/issues/5132"
}
] | null | null | [
"jerryscript-project",
"jerryscript"
] | Issue | ###### JerryScript revision
cefd391772529c8a9531d7b3c244d78d38be47c6
###### Build platform
Ubuntu 22.04.3
###### Build steps
```sh
python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-lim... | SEGV in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5132/comments | 0 | 2024-03-26T07:50:12Z | 2024-03-26T08:59:44Z | https://github.com/jerryscript-project/jerryscript/issues/5132 | 2,207,491,351 | 5,132 | [
0.008634083904325962,
0.015617967583239079,
-0.0004233703075442463,
0.012067089788615704,
0.0076690115965902805,
0.014240344986319542,
-0.01482970267534256,
0.036923233419656754,
-0.03161901608109474,
0.03783673793077469,
-0.02814180962741375,
0.013378409668803215,
0.028244946151971817,
0.... | 1,135 | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : SEGV in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17
Issue date:
--- start body ---
###### JerryScript revision
cefd391772529c8a9531d7b3c244d78d38be47c6
###### Build platform
Ubuntu 22.04.3
###### Build steps
... | 3,212 |
CVE-2024-33260 | 2024-04-26T15:15:49.303 | Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/jerryscript-project/jerryscript/issues/5133"
}
] | null | null | [
"jerryscript-project",
"jerryscript"
] | Issue | ###### JerryScript revision
cefd391772529c8a9531d7b3c244d78d38be47c6
###### Build platform
Ubuntu 22.04.3
###### Build steps
```sh
python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-lim... | SEGV in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5133/comments | 0 | 2024-03-26T08:05:18Z | 2024-03-26T08:06:55Z | https://github.com/jerryscript-project/jerryscript/issues/5133 | 2,207,524,504 | 5,133 | [
-0.005236303433775902,
0.01783730834722519,
0.0013753582024946809,
0.014309616759419441,
0.018485402688384056,
0.005339409224689007,
-0.0281184334307909,
0.03800186514854431,
-0.022182483226060867,
0.046515461057424545,
-0.02369961142539978,
0.0069007258862257,
0.027352504432201385,
0.0045... | 1,136 | This is a GitHub Issue
repo:jerryscript
owner:jerryscript-project
Title : SEGV in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38
Issue date:
--- start body ---
###### JerryScript revision
cefd391772529c8a9531d7b3c244d78d38be47c6
###### Build platform
Ubuntu 22.04.3
###### Build s... | 2,924 |
CVE-2024-4030 | 2024-05-07T21:15:09.467 | On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cna@python.org",
"tags": null,
"url": "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e"
},
{
"source": "cna@python.org",
"tags": null,
"url": "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d"
},
{
"s... | null | null | [
"python",
"cpython"
] | Issue | If we interpret `0o700` as "only accessible by the current user", then we can imitate the behaviour with ACLs.
<!-- gh-linked-prs -->
### Linked PRs
* gh-118488
* gh-118515
* gh-118737
* gh-118738
* gh-118739
* gh-118740
* gh-118741
* gh-118742
* gh-118768
* gh-119056
* gh-119068
* gh-119069
<!-- /gh-linked-prs -->
| [CVE-2024-4030] Enable `mkdir(mode=0o700)` to work on Windows | https://api.github.com/repos/python/cpython/issues/118486/comments | 2 | 2024-05-01T19:53:53Z | 2024-05-24T17:56:51Z | https://github.com/python/cpython/issues/118486 | 2,274,095,396 | 118,486 | [
-0.043284546583890915,
-0.010684003122150898,
-0.005946638528257608,
0.014037557877600193,
0.020295865833759308,
0.04021772742271423,
0.035181161016225815,
0.045852698385715485,
0.015720568597316742,
0.023300351575016975,
0.020969068631529808,
-0.004534779582172632,
0.012148845940828323,
-... | 1,137 | This is a GitHub Issue
repo:cpython
owner:python
Title : [CVE-2024-4030] Enable `mkdir(mode=0o700)` to work on Windows
Issue date:
--- start body ---
If we interpret `0o700` as "only accessible by the current user", then we can imitate the behaviour with ACLs.
<!-- gh-linked-prs -->
### Linked PRs
* gh-118488
* gh-11... | 543 |
CVE-2024-3744 | 2024-05-15T01:15:07.843 | A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud vault solutions. Tokens are only logged when TokenRequests is conf... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://github.com/kubernetes/kubernetes/issues/124759"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://groups.google.com/g/kubernetes-security-announce/c/hcgZE2MQo1A/m/Y4C6q-CYAgAJ"
}
] | null | null | [
"kubernetes",
"kubernetes"
] | Issue | CVSS Rating: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) - **MEDIUM** (6.5)
A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tok... | CVE-2024-3744: azure-file-csi-driver discloses service account tokens in logs | https://api.github.com/repos/kubernetes/kubernetes/issues/124759/comments | 1 | 2024-05-08T16:02:57Z | 2024-05-15T00:45:12Z | https://github.com/kubernetes/kubernetes/issues/124759 | 2,285,943,659 | 124,759 | [
-0.0073183816857635975,
-0.0324457548558712,
0.0019513366278260946,
-0.001871335320174694,
0.02494649961590767,
-0.01632026955485344,
-0.0009504504851065576,
0.04215721786022186,
-0.002502650022506714,
0.03475535660982132,
-0.007499254308640957,
-0.020577730610966682,
0.016515055671334267,
... | 1,138 | This is a GitHub Issue
repo:kubernetes
owner:kubernetes
Title : CVE-2024-3744: azure-file-csi-driver discloses service account tokens in logs
Issue date:
--- start body ---
CVSS Rating: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N... | 2,755 |
CVE-2024-35384 | 2024-05-21T14:15:12.217 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_array_length function in the mjs.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/cesanta/mjs/issues/287"
}
] | null | null | [
"cesanta",
"mjs"
] | Issue | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | Segmentation fault on mjs_array_length | https://api.github.com/repos/cesanta/mjs/issues/287/comments | 0 | 2024-05-09T09:28:46Z | 2024-05-09T09:28:46Z | https://github.com/cesanta/mjs/issues/287 | 2,287,283,663 | 287 | [
-0.009904138743877411,
0.002951771253719926,
0.000015354675269918516,
0.022467993199825287,
0.044700875878334045,
0.023099860176444054,
-0.01121930219233036,
0.04158562794327736,
-0.023614170029759407,
0.007266463711857796,
-0.025098321959376335,
0.00736197829246521,
0.010609477758407593,
... | 1,139 | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : Segmentation fault on mjs_array_length
Issue date:
--- start body ---
**The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef31... | 3,537 |
CVE-2024-35385 | 2024-05-21T14:15:12.307 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_mk_ffi_sig function in the mjs.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/cesanta/mjs/issues/288"
}
] | null | null | [
"cesanta",
"mjs"
] | Issue | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | Segmentation fault on mjs_mk_ffi_sig | https://api.github.com/repos/cesanta/mjs/issues/288/comments | 0 | 2024-05-09T09:35:09Z | 2024-05-09T09:35:09Z | https://github.com/cesanta/mjs/issues/288 | 2,287,295,520 | 288 | [
-0.008865464478731155,
-0.013632950372993946,
-0.0008801088551990688,
0.0197762381285429,
0.032989826053380966,
0.031224092468619347,
-0.00822538509964943,
0.04022934287786484,
-0.03331354632973671,
0.016995204612612724,
-0.03319583088159561,
0.012235076166689396,
-0.002089453861117363,
0.... | 1,140 | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : Segmentation fault on mjs_mk_ffi_sig
Issue date:
--- start body ---
**The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162... | 3,552 |
CVE-2024-35386 | 2024-05-21T14:15:12.400 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_do_gc function in the mjs.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/cesanta/mjs/issues/286"
}
] | null | null | [
"cesanta",
"mjs"
] | Issue | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | Segmentation fault on mjs_do_gc | https://api.github.com/repos/cesanta/mjs/issues/286/comments | 0 | 2024-05-09T09:20:18Z | 2024-05-09T09:29:41Z | https://github.com/cesanta/mjs/issues/286 | 2,287,269,819 | 286 | [
-0.012912939302623272,
-0.00010665193985914811,
-0.00023295480059459805,
0.02336905710399151,
0.029364872723817825,
0.034687984734773636,
-0.024187996983528137,
0.03977711871266365,
-0.02386626973748207,
0.008452637121081352,
-0.015516000799834728,
0.00017274529091082513,
0.00622614240273833... | 1,141 | This is a GitHub Issue
repo:mjs
owner:cesanta
Title : Segmentation fault on mjs_do_gc
Issue date:
--- start body ---
**The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ... | 3,163 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.