cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
71
cve_configurations
listlengths
1
10
cve_tags
listlengths
1
4
issue_owner_repo
listlengths
2
2
type
stringclasses
1 value
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
57
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
38
62
issue_github_id
int64
128M
2.29B
issue_number
int64
3
125k
issue_embedding
listlengths
3.07k
3.07k
__index_level_0__
int64
0
1.14k
msg
stringlengths
175
88.8k
n_tokens
int64
175
88.8k
CVE-2023-49553
2024-01-02T23:15:12.333
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/253" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "Exploit", "Vendor Advisory" ]
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0...
SegFaultOnPc in mjs_destroy() at mjs.c:7563
https://api.github.com/repos/cesanta/mjs/issues/253/comments
0
2023-11-19T09:05:58Z
2023-12-22T02:22:19Z
https://github.com/cesanta/mjs/issues/253
2,000,763,687
253
[ -0.015559551306068897, -0.00648195156827569, -0.0017845084657892585, 0.024407701566815376, 0.02548324689269066, 0.019675303250551224, -0.007629199419170618, 0.03711347281932831, -0.01621921919286251, 0.028595156967639923, -0.027333185076713562, 0.002549041761085391, -0.0014806670369580388, ...
1,100
This is a GitHub Issue repo:mjs owner:cesanta Title : SegFaultOnPc in mjs_destroy() at mjs.c:7563 Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc69...
3,112
CVE-2023-49554
2024-01-03T00:15:08.987
Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/249" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v...
heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389
https://api.github.com/repos/yasm/yasm/issues/249/comments
0
2023-11-20T14:16:57Z
2024-01-03T11:22:46Z
https://github.com/yasm/yasm/issues/249
2,002,305,193
249
[ -0.04197276011109352, 0.023172760382294655, -0.005476740188896656, -0.0013377198483794928, 0.05592532083392143, 0.020655546337366104, 0.007159678265452385, 0.039757609367370605, 0.0039052790962159634, 0.02901269868016243, -0.025215299800038338, 0.007860902696847916, 0.021187756210565567, -...
1,101
This is a GitHub Issue repo:yasm owner:yasm Title : heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/...
6,008
CVE-2023-49555
2024-01-03T00:15:09.047
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/248" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v...
SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357
https://api.github.com/repos/yasm/yasm/issues/248/comments
2
2023-11-20T14:03:30Z
2024-01-04T10:06:59Z
https://github.com/yasm/yasm/issues/248
2,002,278,782
248
[ -0.01620679721236229, 0.039411984384059906, -0.00479191355407238, 0.01459178514778614, 0.06131383031606674, 0.02295018546283245, -0.007713812403380871, 0.044285356998443604, -0.026746883988380432, 0.030855249613523483, -0.04731705039739609, 0.015087622217833996, 0.02831939607858658, 0.0155...
1,102
This is a GitHub Issue repo:yasm owner:yasm Title : SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9d...
2,833
CVE-2023-49556
2024-01-03T00:15:09.090
Buffer Overflow vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/250" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v...
heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019
https://api.github.com/repos/yasm/yasm/issues/250/comments
1
2023-11-20T14:26:40Z
2024-02-12T16:51:53Z
https://github.com/yasm/yasm/issues/250
2,002,324,400
250
[ -0.0400124154984951, 0.04272465035319328, -0.0024798051454126835, -0.002981358440592885, 0.042472999542951584, 0.029722711071372032, -0.0031316496897488832, 0.03662911802530289, -0.000019673841961775906, 0.03363727405667305, -0.03587416559457779, 0.01971261575818062, 0.011037667281925678, ...
1,103
This is a GitHub Issue repo:yasm owner:yasm Title : heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/...
5,995
CVE-2023-49557
2024-01-03T00:15:09.147
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/253" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v...
SEGV in yasm_section_bcs_first() at libyasm/section.c:619
https://api.github.com/repos/yasm/yasm/issues/253/comments
1
2023-11-26T08:48:59Z
2024-01-03T11:22:18Z
https://github.com/yasm/yasm/issues/253
2,010,956,429
253
[ 0.014690331183373928, 0.029125671833753586, -0.005142324138432741, 0.010086322203278542, 0.051763229072093964, 0.004363184329122305, -0.009604671970009804, 0.03782370686531067, -0.004472971893846989, 0.04536011442542076, -0.04700339213013649, 0.014102434739470482, 0.029465658590197563, 0.0...
1,104
This is a GitHub Issue repo:yasm owner:yasm Title : SEGV in yasm_section_bcs_first() at libyasm/section.c:619 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddb...
3,888
CVE-2023-49558
2024-01-03T00:15:09.203
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v...
SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013
https://api.github.com/repos/yasm/yasm/issues/252/comments
3
2023-11-26T04:38:16Z
2024-03-23T09:32:24Z
https://github.com/yasm/yasm/issues/252
2,010,889,074
252
[ -0.02080458588898182, 0.033124931156635284, -0.005848664324730635, 0.010703301057219505, 0.05714960768818855, 0.027090761810541153, -0.027258766815066338, 0.03995712473988533, -0.013769387267529964, 0.029260823503136635, -0.03794106841087341, 0.015176426619291306, 0.0339929573237896, 0.017...
1,105
This is a GitHub Issue repo:yasm owner:yasm Title : SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/comm...
3,441
CVE-2023-46929
2024-01-03T19:15:08.390
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2662" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "Exploit", "Vendor Advisory" ]
[ "gpac", "gpac" ]
Issue
# SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please...
SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
https://api.github.com/repos/gpac/gpac/issues/2662/comments
0
2023-10-24T08:09:10Z
2023-10-26T10:37:04Z
https://github.com/gpac/gpac/issues/2662
1,958,731,817
2,662
[ -0.02351541630923748, 0.02427692525088787, -0.007771205622702837, 0.0037047441583126783, 0.02442922815680504, -0.003369679907336831, -0.04456354305148125, 0.05342751368880272, -0.01546625979244709, 0.023637257516384125, -0.03091728873550892, 0.03368918597698212, 0.03682660311460495, 0.0011...
1,106
This is a GitHub Issue repo:gpac owner:gpac Title : SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 Issue date: --- start body --- # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872...
2,870
CVE-2023-50120
2024-01-10T09:15:44.290
MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2698" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "Exploit", "Issue Tracking" ]
[ "gpac", "gpac" ]
Issue
1.Version MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-...
Infinite loop in av1_uvlc media_tools/av_parsers.c:1664
https://api.github.com/repos/gpac/gpac/issues/2698/comments
1
2023-12-01T04:51:55Z
2023-12-01T10:00:42Z
https://github.com/gpac/gpac/issues/2698
2,020,058,777
2,698
[ -0.033286262303590775, 0.028416605666279793, -0.010864266194403172, 0.014639792032539845, 0.020973429083824158, 0.017629390582442284, -0.030080920085310936, 0.04126880317926407, 0.004326443653553724, 0.020279964432120323, -0.022252483293414116, 0.029618609696626663, 0.0330088771879673, -0....
1,107
This is a GitHub Issue repo:gpac owner:gpac Title : Infinite loop in av1_uvlc media_tools/av_parsers.c:1664 Issue date: --- start body --- 1.Version MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your resea...
2,640
CVE-2024-22749
2024-01-25T16:15:09.010
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2713" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hanxuer/crashes...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "Exploit", "Issue Tracking", "Patch" ]
[ "gpac", "gpac" ]
Issue
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough inf...
buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577
https://api.github.com/repos/gpac/gpac/issues/2713/comments
1
2024-01-06T06:07:11Z
2024-01-08T10:22:24Z
https://github.com/gpac/gpac/issues/2713
2,068,418,306
2,713
[ -0.031427569687366486, 0.024526244029402733, -0.011535070836544037, 0.016472171992063522, 0.029789453372359276, 0.020552296191453934, -0.021947728469967842, 0.05542294308543205, -0.026149192824959755, 0.02887938730418682, -0.02850019372999668, 0.01020030863583088, 0.041680965572595596, 0.0...
1,108
This is a GitHub Issue repo:gpac owner:gpac Title : buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577 Issue date: --- start body --- Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a...
4,828
CVE-2024-22927
2024-02-01T23:15:10.960
Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "weng-xianhu", "eyoucms" ]
Issue
### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a mali...
EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities
https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments
1
2024-01-05T08:05:47Z
2024-03-22T01:36:04Z
https://github.com/weng-xianhu/eyoucms/issues/57
2,066,903,491
57
[ -0.040661998093128204, 0.007006400730460882, -0.012313023209571838, 0.015115584246814251, 0.0817883238196373, 0.006061158608645201, 0.008764219470322132, 0.01719677448272705, -0.00969287846237421, 0.016997776925563812, 0.02668236382305622, 0.005754369311034679, 0.010546913370490074, -0.020...
1,109
This is a GitHub Issue repo:eyoucms owner:weng-xianhu Title : EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities Issue date: --- start body --- ### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple refl...
5,000
CVE-2024-24267
2024-02-05T18:15:52.427
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2571" }, { "source": "cve@mitre.org", "tags": [ "Ex...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
null
[ "gpac", "gpac" ]
Issue
Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center). Dynamic memory is allocated [here](https://github...
Memory leak in function gf_fileio_from_mem
https://api.github.com/repos/gpac/gpac/issues/2571/comments
0
2023-08-29T11:13:38Z
2023-08-29T13:47:19Z
https://github.com/gpac/gpac/issues/2571
1,871,446,973
2,571
[ -0.04677533730864525, 0.008337270468473434, -0.011563902720808983, -0.037247028201818466, -0.002102363621816039, 0.020153816789388657, -0.006456873379647732, 0.04541827365756035, -0.02761765941977501, 0.023791899904608727, -0.006041814107447863, 0.0006243929965421557, 0.019951701164245605, ...
1,110
This is a GitHub Issue repo:gpac owner:gpac Title : Memory leak in function gf_fileio_from_mem Issue date: --- start body --- Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analy...
813
CVE-2024-24186
2024-02-07T14:15:52.870
Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/98" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Exploit", "Vendor Advisory" ]
[ "pcmacdon", "jsish" ]
Issue
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback
https://api.github.com/repos/pcmacdon/jsish/issues/98/comments
0
2024-01-14T11:31:14Z
2024-01-14T11:31:14Z
https://github.com/pcmacdon/jsish/issues/98
2,080,689,779
98
[ -0.02638186886906624, 0.0014252443797886372, -0.001718458835966885, 0.013309704139828682, 0.020784813910722733, -0.017563167959451675, 0.0006620520143769681, 0.03076152503490448, -0.030019210651516914, -0.010407253168523312, -0.027064798399806023, 0.008833546191453934, 0.008061538450419903, ...
1,111
This is a GitHub Issue repo:jsish owner:pcmacdon Title : stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback Issue date: --- start body --- ###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20...
3,133
CVE-2024-24188
2024-02-07T14:15:52.917
Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/100" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "pcmacdon", "jsish" ]
Issue
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
heap-buffer-overflow in ./jsish/src/jsiUtils.c
https://api.github.com/repos/pcmacdon/jsish/issues/100/comments
0
2024-01-20T05:53:20Z
2024-01-20T05:53:20Z
https://github.com/pcmacdon/jsish/issues/100
2,091,916,967
100
[ -0.022208411246538162, -0.0038599641993641853, 0.0008728493703529239, 0.021220725029706955, 0.039420291781425476, -0.003694744547829032, -0.02409663423895836, 0.03053111769258976, -0.03323272988200188, 0.022949175909161568, -0.029369134455919266, -0.0021641943603754044, 0.019216302782297134,...
1,112
This is a GitHub Issue repo:jsish owner:pcmacdon Title : heap-buffer-overflow in ./jsish/src/jsiUtils.c Issue date: --- start body --- ###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5....
4,153
CVE-2024-24189
2024-02-07T14:15:52.967
Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Vendor Advisory" ]
[ "pcmacdon", "jsish" ]
Issue
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase<...
heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar
https://api.github.com/repos/pcmacdon/jsish/issues/101/comments
0
2024-01-20T05:58:02Z
2024-01-20T05:58:02Z
https://github.com/pcmacdon/jsish/issues/101
2,091,919,351
101
[ -0.020732102915644646, -0.013694331049919128, 0.0028279379475861788, 0.013972909189760685, 0.017726387828588486, -0.007616921793669462, -0.01417817734181881, 0.019691098481416702, -0.03741748631000519, 0.018635433167219162, -0.02530665323138237, -0.005578900221735239, 0.010190106928348541, ...
1,113
This is a GitHub Issue repo:jsish owner:pcmacdon Title : heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar Issue date: --- start body --- ###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.0...
4,287
CVE-2024-25451
2024-02-09T15:15:09.143
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210. We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root c...
Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments
2
2023-06-12T09:44:14Z
2024-02-17T17:35:35Z
https://github.com/axiomatic-systems/Bento4/issues/872
1,752,341,840
872
[ -0.02937122993171215, 0.005020082928240299, -0.02078552357852459, 0.014139091596007347, 0.03377867862582207, 0.009290899150073528, -0.05613325163722038, 0.033584751188755035, -0.020997080951929092, 0.054370272904634476, 0.022072497755289078, 0.008475521579384804, 0.03515380248427391, 0.011...
1,114
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640) Issue date: --- start body --- Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple progr...
7,752
CVE-2024-25452
2024-02-09T15:15:09.193
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/873" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71. Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom(). Here is the output of program with address saniti...
Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments
1
2023-06-12T10:03:27Z
2024-02-20T02:41:04Z
https://github.com/axiomatic-systems/Bento4/issues/873
1,752,379,751
873
[ -0.03406800329685211, -0.0019192930776625872, -0.015231228433549404, 0.0006776885129511356, 0.026645855978131294, -0.009638236835598946, -0.047065552324056625, 0.038095660507678986, -0.014747558161616325, 0.050407275557518005, 0.0221960861235857, 0.017332997173070908, 0.025590574368834496, ...
1,115
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640 Issue date: --- start body --- Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:...
7,647
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ================================================================= ==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 s...
NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments
0
2017-09-15T07:10:24Z
2017-12-17T00:59:26Z
https://github.com/axiomatic-systems/Bento4/issues/204
257,947,117
204
[ -0.003325453493744135, 0.034735873341560364, -0.005418977700173855, 0.027797767892479897, 0.04338205233216286, -0.004179490264505148, -0.04008683189749718, 0.05151429772377014, -0.018320225179195404, 0.017519094049930573, -0.02740475907921791, 0.014836057089269161, 0.022854935377836227, 0....
1,116
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp) Issue date: --- start body --- On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ======...
1,845
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom ...
NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments
1
2023-06-12T10:08:57Z
2024-02-17T17:33:31Z
https://github.com/axiomatic-systems/Bento4/issues/874
1,752,392,145
874
[ -0.01246784906834364, 0.010809417814016342, -0.005797105375677347, 0.019264455884695053, 0.01967906393110752, 0.00018659664783626795, -0.05372132360935211, 0.0399504229426384, -0.008381000719964504, 0.03094751015305519, -0.010387405753135681, 0.014222527854144573, 0.033287081867456436, 0.0...
1,117
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640 Issue date: --- start body --- Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). ...
2,992
CVE-2024-25454
2024-02-09T15:15:09.293
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/875" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom c...
NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments
1
2023-06-12T10:12:34Z
2024-02-17T17:30:47Z
https://github.com/axiomatic-systems/Bento4/issues/875
1,752,398,555
875
[ -0.004776338115334511, 0.0205055084079504, -0.005664608906954527, 0.0084461010992527, 0.023486483842134476, 0.005423721857368946, -0.05880654230713844, 0.033152077347040176, -0.013391812331974506, 0.03408551216125488, -0.014137056656181812, 0.009808618575334549, 0.027521342039108276, 0.012...
1,118
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640 Issue date: --- start body --- Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). ...
4,683
CVE-2024-24155
2024-02-29T01:44:11.810
Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/919" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628...
Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks
https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments
1
2024-01-13T21:23:38Z
2024-02-21T22:47:29Z
https://github.com/axiomatic-systems/Bento4/issues/919
2,080,480,764
919
[ -0.026192614808678627, 0.01679377444088459, -0.017928728833794594, -0.002063754480332136, 0.01087959948927164, 0.008640725165605545, -0.04380213841795921, 0.019755296409130096, -0.016031228005886078, 0.03497077524662018, 0.01044512540102005, 0.03055509552359581, 0.024082308635115623, 0.000...
1,119
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks Issue date: --- start body --- ### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu ...
10,694
CVE-2023-46426
2024-03-09T06:15:50.637
Heap-based Buffer Overflow vulnerability in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) via gf_fwrite component in at utils/os_file.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2642" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD) Author: jeanlf <jeanlf@gpac.io> Date: Thu Oct 12 16:58:53 2023 +0200 ./bin/gcc/MP4Box -version MP4Box - GPAC version 2...
heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657
https://api.github.com/repos/gpac/gpac/issues/2642/comments
1
2023-10-13T09:11:40Z
2024-03-10T19:44:37Z
https://github.com/gpac/gpac/issues/2642
1,941,560,024
2,642
[ -0.049831703305244446, -0.002920901868492365, -0.015107816085219383, 0.022128304466605186, 0.04129699245095253, 0.02703232318162918, -0.02152605727314949, 0.0398515984416008, -0.02223154716193676, 0.040574293583631516, 0.020115075632929802, 0.015968170017004013, 0.028374474495649338, -0.00...
1,120
This is a GitHub Issue repo:gpac owner:gpac Title : heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 Issue date: --- start body --- # Description heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/maste...
7,129
CVE-2023-46427
2024-03-09T06:15:50.740
An issue was discovered in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via null pointer deference in gf_dash_setup_period component in media_tools/dash_client.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2641" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD) Author: jeanlf <jeanlf@gpac.io> Date: Thu Oct 12 16:58:53 2023 +0200 ./bin/gcc/MP4Box -version ...
Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333
https://api.github.com/repos/gpac/gpac/issues/2641/comments
1
2023-10-13T08:54:46Z
2024-03-10T19:46:45Z
https://github.com/gpac/gpac/issues/2641
1,941,533,993
2,641
[ -0.04704863578081131, 0.016906224191188812, -0.009137483313679695, 0.014161218889057636, 0.02298283763229847, -0.001406345167197287, -0.03453442081809044, 0.04382983595132828, -0.022290946915745735, 0.0027675668243318796, -0.01944817416369915, -0.007283664774149656, 0.014537246897816658, -...
1,121
This is a GitHub Issue repo:gpac owner:gpac Title : Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 Issue date: --- start body --- # Description Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 # Version ``` git log commit 7edc40feef23efd8c9948292...
3,235
CVE-2024-28318
2024-03-15T15:15:08.977
gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2764" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description ``` Out of write in swf_get_string at scene_manager/swf_parse.c:325 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD) Author: Aurelien David <aurelien.david@telecom-paristech.fr> Date: Mon Feb 26 10:53:25 2024 +0100 ./MP4Box...
Out of write in swf_get_string at scene_manager/swf_parse.c:325
https://api.github.com/repos/gpac/gpac/issues/2764/comments
0
2024-02-27T07:59:08Z
2024-02-27T13:59:41Z
https://github.com/gpac/gpac/issues/2764
2,155,912,726
2,764
[ -0.03485049679875374, 0.02528729848563671, -0.0033678084146231413, 0.04067423567175865, 0.06326422095298767, 0.025195345282554626, -0.024873506277799606, 0.04358610883355141, -0.04870487004518509, -0.010168558917939663, 0.0044750855304300785, 0.029225986450910568, 0.02591565065085888, 0.00...
1,122
This is a GitHub Issue repo:gpac owner:gpac Title : Out of write in swf_get_string at scene_manager/swf_parse.c:325 Issue date: --- start body --- # Description ``` Out of write in swf_get_string at scene_manager/swf_parse.c:325 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD ->...
3,404
CVE-2024-28319
2024-03-15T15:15:09.020
gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain an out of boundary read vulnerability via gf_dash_setup_period media_tools/dash_client.c:6374
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2763" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description ``` Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD) Author: Aurelien David <aurelien.david@telecom-paristech.fr> Date: Mon Feb 26 10:53:25 2024 +0100 ./MP...
Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374
https://api.github.com/repos/gpac/gpac/issues/2763/comments
0
2024-02-27T02:31:15Z
2024-02-27T13:59:40Z
https://github.com/gpac/gpac/issues/2763
2,155,523,042
2,763
[ -0.04481612145900726, 0.002722382778301835, -0.0054998029954731464, 0.01235195156186819, 0.029327040538191795, -0.010347019881010056, -0.033399805426597595, 0.04689181596040726, -0.04236302897334099, 0.00923054851591587, -0.009254136122763157, 0.003483077511191368, 0.03387155383825302, -0....
1,123
This is a GitHub Issue repo:gpac owner:gpac Title : Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 Issue date: --- start body --- # Description ``` Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (...
3,352
CVE-2023-6597
2024-03-19T16:15:08.743
An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potential...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integri...
[ { "source": "cna@python.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5" }, { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a" }, { "source": "cna@python.org", ...
null
null
[ "python", "cpython" ]
Issue
BPO | [46977](https://bugs.python.org/issue46977) --- | :--- Nosy | @afeblot <sup>*Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.*</sup> <details><summary>Show more details</summary><p> GitHub fields: ```python assignee = None closed_at = None c...
tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks [CVE-2023-6597]
https://api.github.com/repos/python/cpython/issues/91133/comments
6
2022-03-10T17:22:09Z
2024-05-15T15:20:23Z
https://github.com/python/cpython/issues/91133
1,199,076,757
91,133
[ -0.03331015259027481, -0.034768085926771164, -0.003768396098166704, 0.01076772902160883, 0.023957114666700363, 0.03575652092695236, 0.05426490306854248, 0.0063506742008030415, -0.0005061851697973907, 0.018631938844919205, -0.0044324989430606365, 0.01974392496049404, -0.03204990178346634, -...
1,124
This is a GitHub Issue repo:cpython owner:python Title : tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks [CVE-2023-6597] Issue date: --- start body --- BPO | [46977](https://bugs.python.org/issue46977) --- | :--- Nosy | @afeblot <sup>*Note: these values reflect the state of the i...
1,599
CVE-2024-0450
2024-03-19T16:15:09.180
An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile mo...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cna@python.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5" }, { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85" }, { "source": "cna@python.org", ...
null
null
[ "python", "cpython" ]
Issue
# Bug report ### Bug description: Just found this vulnerability in the latest Python 3.11.5 (and previous 3.10.10). If we craft a zipbomb using the "quoted-overlap" way (as mentioned [https://www.bamsoftware.com/hacks/zipbomb/](https://urldefense.com/v3/__https://www.bamsoftware.com/hacks/zipbomb/__;!!ACWV5N9M2RV99h...
Python "zipfile" can't detect "quoted-overlap" zipbomb that can be used as a DoS attack
https://api.github.com/repos/python/cpython/issues/109858/comments
12
2023-09-25T16:54:41Z
2024-05-15T15:21:04Z
https://github.com/python/cpython/issues/109858
1,911,928,055
109,858
[ -0.03647473827004433, 0.01606975868344307, -0.0095334742218256, 0.045038141310214996, 0.014544402249157429, 0.02305428311228752, 0.022371886298060417, 0.026827530935406685, -0.0019635611679404974, 0.011025379411876202, 0.007432764861732721, -0.005526070017367601, 0.016564829275012016, -0.0...
1,125
This is a GitHub Issue repo:cpython owner:python Title : Python "zipfile" can't detect "quoted-overlap" zipbomb that can be used as a DoS attack Issue date: --- start body --- # Bug report ### Bug description: Just found this vulnerability in the latest Python 3.11.5 (and previous 3.10.10). If we craft a zipbomb us...
2,481
CVE-2024-29489
2024-03-28T23:15:46.527
Jerryscript 2.4.0 has SEGV at ./jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/commit/cefd391772529c8a9531d7b3c244d78d38be47c6" }, { "s...
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision ``` $ git show commit a588e4966175a190ec6350b2a3689d30ed017ec9 (HEAD -> master, origin/master, origin/HEAD) Author: Máté Tokodi <tokodi.mate.24@gmail.com> Date: Wed Sep 20 15:38:30 2023 +0200 ``` ###### Build & Execution platform ``` $ uname -a Linux user-AYA-NEO-FOUNDER 5.19.0...
SEGV ./jerry-core/ecma/base/ecma-helpers.c:238:58
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5101/comments
1
2023-10-04T12:41:53Z
2024-03-27T02:29:25Z
https://github.com/jerryscript-project/jerryscript/issues/5101
1,926,132,986
5,101
[ -0.02791563607752323, -0.02278934232890606, -0.007645850535482168, 0.011673652566969395, 0.030810074880719185, 0.0032562429551035166, -0.024253997951745987, 0.03923184424638748, -0.03940620645880699, 0.0358143150806427, -0.015910692512989044, 0.021969832479953766, 0.02374834194779396, -0.0...
1,126
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV ./jerry-core/ecma/base/ecma-helpers.c:238:58 Issue date: --- start body --- ###### JerryScript revision ``` $ git show commit a588e4966175a190ec6350b2a3689d30ed017ec9 (HEAD -> master, origin/master, origin/HEAD) Author: Máté Tokodi <tok...
10,189
CVE-2024-31002
2024-04-02T08:15:59.863
Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the AP4 BitReader::ReadCache() at Ap4Utils.cpp component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/939" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31002" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================================================= ==3304149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000160 at pc 0x00000055f635 bp...
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/939/comments
0
2024-03-25T01:47:30Z
2024-03-25T11:23:45Z
https://github.com/axiomatic-systems/Bento4/issues/939
2,204,715,905
939
[ -0.02213333360850811, -0.0017176206456497312, -0.019634976983070374, -0.007451086770743132, 0.02860794961452484, -0.011823211796581745, -0.04423147812485695, 0.04124048724770546, -0.007407101336866617, 0.030244197696447372, -0.0029338104650378227, 0.014717435464262962, 0.02721801958978176, ...
1,127
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Heap-buffer-overflow with ASAN in mp42aac Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================...
11,051
CVE-2024-31004
2024-04-02T08:16:10.720
An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the Ap4StsdAtom.cpp,AP4_StsdAtom::AP4_StsdAtom,mp4fragment.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/941" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31004" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` unable to autodetect fragment duration, using default AddressSanitizer:DEADLYSIGNAL ================================================================= ==1718535==ERROR: Ad...
SEGV ASAN in mp4fragment
https://api.github.com/repos/axiomatic-systems/Bento4/issues/941/comments
0
2024-03-25T11:44:04Z
2024-03-25T11:44:04Z
https://github.com/axiomatic-systems/Bento4/issues/941
2,205,549,858
941
[ -0.013229062780737877, 0.012896984815597534, -0.010139964520931244, -0.009143730625510216, 0.030798308551311493, -0.01356114074587822, -0.05510950833559036, 0.04222797229886055, -0.021546458825469017, 0.016063310205936432, -0.014657770283520222, 0.020527057349681854, 0.015090243890881538, ...
1,128
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : SEGV ASAN in mp4fragment Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` unable to autodetect fragment duration, using def...
5,129
CVE-2024-30806
2024-04-02T18:15:12.397
An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/914" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30806" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================================================= ==1982814==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000011f at pc 0x0000008aa64d bp...
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/914/comments
0
2023-12-28T03:49:43Z
2024-02-17T18:14:52Z
https://github.com/axiomatic-systems/Bento4/issues/914
2,057,955,798
914
[ -0.030684994533658028, -0.0003192806034348905, -0.016858015209436417, -0.01590443029999733, 0.028999192640185356, -0.01254985574632883, -0.05077838525176048, 0.03896074742078781, -0.012337001971900463, 0.03090636245906353, -0.012898935936391354, 0.010148866102099419, 0.026087353006005287, ...
1,129
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Heap-buffer-overflow with ASAN in mp42aac Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================...
6,670
CVE-2024-30807
2024-04-02T18:15:12.460
An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_UnknownAtom::~AP4_UnknownAtom at Ap4Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/937" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30807" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output **BUG1** ``` ================================================================= ==2611989==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000010 at pc 0x0000...
heap-use-after-free with ASAN in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/937/comments
0
2024-03-24T11:59:55Z
2024-03-24T12:44:25Z
https://github.com/axiomatic-systems/Bento4/issues/937
2,204,316,177
937
[ -0.014197764918208122, -0.010408708825707436, -0.02363009750843048, 0.0062210396863520145, 0.02655026875436306, -0.005611923988908529, -0.053960464894771576, 0.03633194789290428, -0.008218579925596714, 0.039270032197237015, 0.005723894108086824, 0.003699480788782239, 0.024257127195596695, ...
1,130
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : heap-use-after-free with ASAN in mp42ts Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output **BUG1** ``` ======================...
14,693
CVE-2023-51792
2024-04-19T17:15:52.240
Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of service via the allocation size exceeding the maximum supported size of 0x10000000000.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/strukturag/libde265" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/strukturag/libde265/issues/427" } ]
null
null
[ "strukturag", "libde265" ]
Issue
## Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 ### Description Libde265 v1.0.12 was discovered that requested allocation size 0xffffffffffff5b00 (0xffffffffffff6b00 after adjustments for alignment, red zones etc.) exceeds maximum supported size of...
Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000
https://api.github.com/repos/strukturag/libde265/issues/427/comments
2
2023-11-03T17:49:11Z
2023-11-07T07:22:15Z
https://github.com/strukturag/libde265/issues/427
1,976,668,054
427
[ -0.02941569872200489, 0.02186926268041134, -0.0013167760334908962, 0.00908652413636446, 0.05867738649249077, -0.011912588030099869, -0.017187392339110374, 0.0527634471654892, -0.00319953472353518, 0.027721600607037544, -0.008624497801065445, 0.014723249711096287, -0.006718637887388468, 0.0...
1,131
This is a GitHub Issue repo:libde265 owner:strukturag Title : Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 Issue date: --- start body --- ## Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 ...
3,172
CVE-2024-3177
2024-04-22T23:15:51.180
A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a se...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrit...
[ { "source": "jordan@liggitt.net", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/04/16/4" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://github.com/kubernetes/kubernetes/issues/124336" }, { "source": "jordan@liggitt.net", "tags": nul...
null
null
[ "kubernetes", "kubernetes" ]
Issue
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) - **Low** (2.7) A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the Servi...
CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
https://api.github.com/repos/kubernetes/kubernetes/issues/124336/comments
1
2024-04-16T14:04:09Z
2024-04-18T19:04:58Z
https://github.com/kubernetes/kubernetes/issues/124336
2,246,153,626
124,336
[ -0.010574561543762684, -0.03558867797255516, -0.0009968254016712308, -0.005776520352810621, 0.027411388233304024, -0.009386408142745495, -0.014537401497364044, 0.02907480299472809, 0.0032254857942461967, 0.013698704540729523, -0.0015009167836979032, -0.0021998302545398474, 0.0234136022627353...
1,132
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin Issue date: --- start body --- CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/U...
3,476
CVE-2024-33255
2024-04-26T15:15:49.130
Jerryscript commit cefd391 was discovered to contain an Assertion Failure via ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5135" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --debug --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --s...
Assertion ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5135/comments
0
2024-03-26T09:16:48Z
2024-04-02T14:50:04Z
https://github.com/jerryscript-project/jerryscript/issues/5135
2,207,672,144
5,135
[ 0.007730433251708746, 0.010248346254229546, -0.005326636601239443, 0.015372518450021744, 0.012309795245528221, 0.004262781701982021, 0.011868055909872055, 0.025974256917834282, -0.03734167292714119, 0.0033480138517916203, -0.00859918724745512, 0.020275821909308434, 0.022028053179383278, 0....
1,133
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : Assertion ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list Issue date: --- start body --- ###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps `...
1,710
CVE-2024-33258
2024-04-26T15:15:49.180
Jerryscript commit ff9ff8f was discovered to contain a segmentation violation via the component vm_loop at jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5114" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision ff9ff8f36c967890b5ebb240d9fa90d6e351aa01 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --debug --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --s...
SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5114/comments
0
2023-11-23T03:57:03Z
2024-06-18T18:02:50Z
https://github.com/jerryscript-project/jerryscript/issues/5114
2,007,446,629
5,114
[ -0.010278626345098019, -0.00975320115685463, -0.0055374871008098125, 0.010680905543267727, 0.0256308875977993, -0.010549549013376236, -0.01477757841348648, 0.043281883001327515, -0.02671457827091217, 0.037436529994010925, -0.0020042089745402336, 0.02280672825872898, 0.03714098036289215, -0...
1,134
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop Issue date: --- start body --- ###### JerryScript revision ff9ff8f36c967890b5ebb240d9fa90d6e351aa01 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/bu...
5,288
CVE-2024-33259
2024-04-26T15:15:49.250
Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component scanner_seek at jerry-core/parser/js/js-scanner-util.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5132" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-lim...
SEGV in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5132/comments
0
2024-03-26T07:50:12Z
2024-03-26T08:59:44Z
https://github.com/jerryscript-project/jerryscript/issues/5132
2,207,491,351
5,132
[ 0.008634083904325962, 0.015617967583239079, -0.0004233703075442463, 0.012067089788615704, 0.0076690115965902805, 0.014240344986319542, -0.01482970267534256, 0.036923233419656754, -0.03161901608109474, 0.03783673793077469, -0.02814180962741375, 0.013378409668803215, 0.028244946151971817, 0....
1,135
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 Issue date: --- start body --- ###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ...
3,212
CVE-2024-33260
2024-04-26T15:15:49.303
Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5133" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-lim...
SEGV in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5133/comments
0
2024-03-26T08:05:18Z
2024-03-26T08:06:55Z
https://github.com/jerryscript-project/jerryscript/issues/5133
2,207,524,504
5,133
[ -0.005236303433775902, 0.01783730834722519, 0.0013753582024946809, 0.014309616759419441, 0.018485402688384056, 0.005339409224689007, -0.0281184334307909, 0.03800186514854431, -0.022182483226060867, 0.046515461057424545, -0.02369961142539978, 0.0069007258862257, 0.027352504432201385, 0.0045...
1,136
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 Issue date: --- start body --- ###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build s...
2,924
CVE-2024-4030
2024-05-07T21:15:09.467
On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e" }, { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d" }, { "s...
null
null
[ "python", "cpython" ]
Issue
If we interpret `0o700` as "only accessible by the current user", then we can imitate the behaviour with ACLs. <!-- gh-linked-prs --> ### Linked PRs * gh-118488 * gh-118515 * gh-118737 * gh-118738 * gh-118739 * gh-118740 * gh-118741 * gh-118742 * gh-118768 * gh-119056 * gh-119068 * gh-119069 <!-- /gh-linked-prs -->
[CVE-2024-4030] Enable `mkdir(mode=0o700)` to work on Windows
https://api.github.com/repos/python/cpython/issues/118486/comments
2
2024-05-01T19:53:53Z
2024-05-24T17:56:51Z
https://github.com/python/cpython/issues/118486
2,274,095,396
118,486
[ -0.043284546583890915, -0.010684003122150898, -0.005946638528257608, 0.014037557877600193, 0.020295865833759308, 0.04021772742271423, 0.035181161016225815, 0.045852698385715485, 0.015720568597316742, 0.023300351575016975, 0.020969068631529808, -0.004534779582172632, 0.012148845940828323, -...
1,137
This is a GitHub Issue repo:cpython owner:python Title : [CVE-2024-4030] Enable `mkdir(mode=0o700)` to work on Windows Issue date: --- start body --- If we interpret `0o700` as "only accessible by the current user", then we can imitate the behaviour with ACLs. <!-- gh-linked-prs --> ### Linked PRs * gh-118488 * gh-11...
543
CVE-2024-3744
2024-05-15T01:15:07.843
A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud vault solutions. Tokens are only logged when TokenRequests is conf...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": null, "url": "https://github.com/kubernetes/kubernetes/issues/124759" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://groups.google.com/g/kubernetes-security-announce/c/hcgZE2MQo1A/m/Y4C6q-CYAgAJ" } ]
null
null
[ "kubernetes", "kubernetes" ]
Issue
CVSS Rating: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) - **MEDIUM** (6.5) A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tok...
CVE-2024-3744: azure-file-csi-driver discloses service account tokens in logs
https://api.github.com/repos/kubernetes/kubernetes/issues/124759/comments
1
2024-05-08T16:02:57Z
2024-05-15T00:45:12Z
https://github.com/kubernetes/kubernetes/issues/124759
2,285,943,659
124,759
[ -0.0073183816857635975, -0.0324457548558712, 0.0019513366278260946, -0.001871335320174694, 0.02494649961590767, -0.01632026955485344, -0.0009504504851065576, 0.04215721786022186, -0.002502650022506714, 0.03475535660982132, -0.007499254308640957, -0.020577730610966682, 0.016515055671334267, ...
1,138
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2024-3744: azure-file-csi-driver discloses service account tokens in logs Issue date: --- start body --- CVSS Rating: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N...
2,755
CVE-2024-35384
2024-05-21T14:15:12.217
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_array_length function in the mjs.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/cesanta/mjs/issues/287" } ]
null
null
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0...
Segmentation fault on mjs_array_length
https://api.github.com/repos/cesanta/mjs/issues/287/comments
0
2024-05-09T09:28:46Z
2024-05-09T09:28:46Z
https://github.com/cesanta/mjs/issues/287
2,287,283,663
287
[ -0.009904138743877411, 0.002951771253719926, 0.000015354675269918516, 0.022467993199825287, 0.044700875878334045, 0.023099860176444054, -0.01121930219233036, 0.04158562794327736, -0.023614170029759407, 0.007266463711857796, -0.025098321959376335, 0.00736197829246521, 0.010609477758407593, ...
1,139
This is a GitHub Issue repo:mjs owner:cesanta Title : Segmentation fault on mjs_array_length Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef31...
3,537
CVE-2024-35385
2024-05-21T14:15:12.307
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_mk_ffi_sig function in the mjs.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/cesanta/mjs/issues/288" } ]
null
null
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0...
Segmentation fault on mjs_mk_ffi_sig
https://api.github.com/repos/cesanta/mjs/issues/288/comments
0
2024-05-09T09:35:09Z
2024-05-09T09:35:09Z
https://github.com/cesanta/mjs/issues/288
2,287,295,520
288
[ -0.008865464478731155, -0.013632950372993946, -0.0008801088551990688, 0.0197762381285429, 0.032989826053380966, 0.031224092468619347, -0.00822538509964943, 0.04022934287786484, -0.03331354632973671, 0.016995204612612724, -0.03319583088159561, 0.012235076166689396, -0.002089453861117363, 0....
1,140
This is a GitHub Issue repo:mjs owner:cesanta Title : Segmentation fault on mjs_mk_ffi_sig Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162...
3,552
CVE-2024-35386
2024-05-21T14:15:12.400
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_do_gc function in the mjs.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/cesanta/mjs/issues/286" } ]
null
null
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0...
Segmentation fault on mjs_do_gc
https://api.github.com/repos/cesanta/mjs/issues/286/comments
0
2024-05-09T09:20:18Z
2024-05-09T09:29:41Z
https://github.com/cesanta/mjs/issues/286
2,287,269,819
286
[ -0.012912939302623272, -0.00010665193985914811, -0.00023295480059459805, 0.02336905710399151, 0.029364872723817825, 0.034687984734773636, -0.024187996983528137, 0.03977711871266365, -0.02386626973748207, 0.008452637121081352, -0.015516000799834728, 0.00017274529091082513, 0.00622614240273833...
1,141
This is a GitHub Issue repo:mjs owner:cesanta Title : Segmentation fault on mjs_do_gc Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ...
3,163