Show filters
147 Total Results
Displaying 141-147 of 147
Sort by:
Attacker Value
Unknown
CVE-2018-13846
Disclosure Date: July 10, 2018 (last updated November 27, 2024)
An issue has been found in Bento4 1.5.1-624. AP4_Mpeg2TsVideoSampleStream::WriteSample in Core/Ap4Mpeg2Ts.cpp has a heap-based buffer over-read after a call from Mp42Ts.cpp, a related issue to CVE-2018-14532.
0
Attacker Value
Unknown
CVE-2018-13848
Disclosure Date: July 10, 2018 (last updated November 27, 2024)
An issue has been found in Bento4 1.5.1-624. It is a SEGV in AP4_StszAtom::GetSampleSize in Core/Ap4StszAtom.cpp.
0
Attacker Value
Unknown
CVE-2018-13847
Disclosure Date: July 10, 2018 (last updated November 27, 2024)
An issue has been found in Bento4 1.5.1-624. It is a SEGV in AP4_StcoAtom::AdjustChunkOffsets in Core/Ap4StcoAtom.cpp.
0
Attacker Value
Unknown
CVE-2018-5253
Disclosure Date: January 05, 2018 (last updated November 26, 2024)
The AP4_FtypAtom class in Core/Ap4FtypAtom.cpp in Bento4 1.5.1.0 has an Infinite loop via a crafted MP4 file that triggers size mishandling.
0
Attacker Value
Unknown
CVE-2017-14646
Disclosure Date: September 21, 2017 (last updated November 26, 2024)
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
0
Attacker Value
Unknown
CVE-2017-14260
Disclosure Date: September 11, 2017 (last updated November 26, 2024)
In the SDK in Bento4 1.5.0-616, the AP4_StssAtom class in Ap4StssAtom.cpp contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.
0
Attacker Value
Unknown
CVE-2017-12475
Disclosure Date: September 06, 2017 (last updated November 26, 2024)
The AP4_Processor::Process function in Core/Ap4Processor.cpp in Bento4 mp4encrypt before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
0