cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 71 | cve_configurations listlengths 1 10 ⌀ | cve_tags sequencelengths 1 4 ⌀ | issue_owner_repo sequencelengths 2 2 | type stringclasses 1
value | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 57 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 38 62 | issue_github_id int64 128M 2.29B | issue_number int64 3 125k | issue_embedding sequencelengths 3.07k 3.07k ⌀ | __index_level_0__ int64 0 1.14k | msg stringlengths 175 88.8k | n_tokens int64 175 88.8k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2018-20659 | 2019-01-02T17:29:00.220 | An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/350"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"Exploit",
"Third Party Advisory"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627
Triggered by
./mp42hls crash7.mp4
Poc
[crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip)
Bento4 Version 1.5.1-627
The ASAN information is as follows:
```
==10432==ERROR: Add... | Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls | https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments | 2 | 2018-12-31T15:52:26Z | 2019-01-12T21:14:48Z | https://github.com/axiomatic-systems/Bento4/issues/350 | 394,998,583 | 350 | [
-0.021416833624243736,
0.005525269545614719,
-0.01057156827300787,
0.011272918432950974,
0.03262132778763771,
-0.009972854517400265,
-0.039412450045347214,
0.033972710371017456,
-0.0039472319185733795,
0.032723963260650635,
-0.0036628430243581533,
0.016259346157312393,
0.010725523345172405,
... | 0 | This is a GitHub Issue
repo:Bento4
owner:axiomatic-systems
Title : Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls
Issue date:
--- start body ---
A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627
Triggered by
./mp... | 17,108 |
CVE-2018-14718 | 2019-01-02T18:29:00.310 | "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code (...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"HIGH","cvssData":{"accessComplexity":"LOW","ac(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"],"url":"http://www.securityfoc(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*","matchCri(...TRUNCATED) | [
"Patch",
"Third Party Advisory"
] | [
"FasterXML",
"jackson-databind"
] | Issue | "This issue covers following CVEs related to polymorphic deserialization, gadgets:\r\n\r\n* CVE-2018(...TRUNCATED) | Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments | 11 | 2018-07-27T05:58:22Z | 2019-10-16T04:34:07Z | https://github.com/FasterXML/jackson-databind/issues/2097 | 345,100,313 | 2,097 | [0.0074428049847483635,-0.013423113152384758,-0.016840431839227676,0.02090935967862606,0.03310165926(...TRUNCATED) | 1 | "This is a GitHub Issue\nrepo:jackson-databind\nowner:FasterXML\nTitle : Block more classes from pol(...TRUNCATED) | 705 |
CVE-2018-19360 | 2019-01-02T18:29:00.717 | "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by lev(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"HIGH","cvssData":{"accessComplexity":"LOW","ac(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"],"url":"http://www.securityfoc(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*","matchCri(...TRUNCATED) | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | [
"FasterXML",
"jackson-databind"
] | Issue | "This issue covers following CVEs related to polymorphic deserialization, gadgets:\r\n\r\nCVE-2018-1(...TRUNCATED) | "Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362(...TRUNCATED) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments | 8 | 2018-11-18T23:39:02Z | 2020-07-31T17:29:54Z | https://github.com/FasterXML/jackson-databind/issues/2186 | 382,014,049 | 2,186 | [0.0028032574336975813,-0.009676402434706688,-0.01738128252327442,0.024644020944833755,0.02373074181(...TRUNCATED) | 2 | "This is a GitHub Issue\nrepo:jackson-databind\nowner:FasterXML\nTitle : Block more classes from pol(...TRUNCATED) | 735 |
CVE-2019-6132 | 2019-01-11T05:29:01.763 | "An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in AP4_DescriptorFactory::Crea(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*","matchCriteri(...TRUNCATED) | [
"Exploit",
"Third Party Advisory"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | "there is memory leaks in Ap4String.cpp\r\n\r\n./mp42aac poc /dev/null\r\n\r\n=================(...TRUNCATED) | memory leaks in Ap4String.cpp | https://api.github.com/repos/axiomatic-systems/Bento4/issues/357/comments | 1 | 2019-01-10T17:00:31Z | 2019-01-12T09:36:13Z | https://github.com/axiomatic-systems/Bento4/issues/357 | 397,925,621 | 357 | [-0.005346340127289295,0.018189847469329834,-0.005688167642802,0.0014844543766230345,0.0155858099460(...TRUNCATED) | 3 | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : memory leaks in Ap4String.cpp(...TRUNCATED) | 2,144 |
CVE-2019-6779 | 2019-01-24T19:29:00.197 | Cscms 4.1.8 allows admin.php/links/save CSRF to add, modify, or delete friend links. | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/chshc(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:chshcms:cscms:4.1.8:*:*:*:*:*:*:*","matchCriteriaId":(...TRUNCATED) | [
"Exploit",
"Third Party Advisory"
] | [
"chshcms",
"cscms"
] | Issue | " just use add friend links for example:\r\n\r\nAfter the admin logged in, we can send him a url wit(...TRUNCATED) | There is a CSRF vulnerability that can add/modify/delete friend links | https://api.github.com/repos/chshcms/cscms/issues/3/comments | 0 | 2019-01-24T14:51:59Z | 2020-02-27T04:22:34Z | https://github.com/chshcms/cscms/issues/3 | 402,743,077 | 3 | [-0.013318462297320366,-0.0017178509151563048,-0.009469583630561829,0.010683059692382812,0.012618666(...TRUNCATED) | 4 | "This is a GitHub Issue\nrepo:cscms\nowner:chshcms\nTitle : There is a CSRF vulnerability that can a(...TRUNCATED) | 1,421 |
CVE-2019-6966 | 2019-01-25T23:29:00.237 | "An issue was discovered in Bento4 1.5.1-628. The AP4_ElstAtom class in Core/Ap4ElstAtom.cpp has an (...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*","matchCriteri(...TRUNCATED) | [
"Exploit",
"Third Party Advisory"
] | [
"axiomatic-systems",
"Bento4"
] | Issue | "A crafted input will lead to failed allocate LargeMmapAllocator in Ap4Array.h at Bento4 1.5.1-628(...TRUNCATED) | failed to allocate LargeMmapAllocator in Ap4Array.h at Bento4 v1.5.1-628 when running mp42hls | https://api.github.com/repos/axiomatic-systems/Bento4/issues/361/comments | 1 | 2019-01-25T07:49:22Z | 2019-12-26T14:50:59Z | https://github.com/axiomatic-systems/Bento4/issues/361 | 403,042,062 | 361 | [-0.02854139357805252,0.005858820863068104,-0.01280048955231905,0.012950151227414608,0.0336827188730(...TRUNCATED) | 5 | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : failed to allocate LargeMmap(...TRUNCATED) | 10,966 |
CVE-2019-7395 | 2019-02-05T00:29:00.400 | In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"],"url":"http://lists.opensus(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED) | [
"Exploit",
"Patch",
"Third Party Advisory"
] | [
"ImageMagick",
"ImageMagick"
] | Issue | "### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED) | memory leak in WritePSDChannel in coders/psd.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1451/comments | 2 | 2019-01-17T03:11:55Z | 2019-02-12T01:45:47Z | https://github.com/ImageMagick/ImageMagick/issues/1451 | 400,092,278 | 1,451 | [-0.030279599130153656,0.01799202896654606,-0.004521663300693035,0.04317546263337135,0.0178162995725(...TRUNCATED) | 6 | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : memory leak in WritePSDChannel(...TRUNCATED) | 3,069 |
CVE-2019-7396 | 2019-02-05T00:29:00.447 | In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c. | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"],"url":"http://lists.opensus(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED) | [
"Exploit",
"Patch",
"Third Party Advisory"
] | [
"ImageMagick",
"ImageMagick"
] | Issue | "### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED) | Potential Memory Leak in ReadSIXELImage in coders/sixel.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1452/comments | 2 | 2019-01-17T04:06:51Z | 2019-03-11T01:54:07Z | https://github.com/ImageMagick/ImageMagick/issues/1452 | 400,102,085 | 1,452 | [-0.024491598829627037,0.024295441806316376,-0.0038425747770816088,0.018761012703180313,0.0354763865(...TRUNCATED) | 7 | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Potential Memory Leak in ReadS(...TRUNCATED) | 4,647 |
CVE-2019-7397 | 2019-02-05T00:29:00.510 | "In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in Wri(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Patch","Third Party Advisory"],"url":"http://hg.graphicsmagick.o(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED) | [
"Exploit",
"Patch",
"Third Party Advisory"
] | [
"ImageMagick",
"ImageMagick"
] | Issue | "### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED) | Potential Memory Leak in WritePDFImage in coders/pdf.c different from #576 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1454/comments | 2 | 2019-01-17T11:10:56Z | 2019-02-12T01:46:36Z | https://github.com/ImageMagick/ImageMagick/issues/1454 | 400,226,040 | 1,454 | [-0.03378884494304657,0.02055272087454796,-0.005026558879762888,0.034393761307001114,0.0209848042577(...TRUNCATED) | 8 | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Potential Memory Leak in Write(...TRUNCATED) | 3,591 |
CVE-2019-7398 | 2019-02-05T00:29:00.570 | In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c. | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"],"url":"http://lists.opensus(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*","matchCriter(...TRUNCATED) | [
"Exploit",
"Patch",
"Third Party Advisory"
] | [
"ImageMagick",
"ImageMagick"
] | Issue | "### Prerequisites\r\n\r\n- [x] I have written a descriptive issue title\r\n- [x] I have verified th(...TRUNCATED) | Potential Memory Leak in WriteDIBImage in coders/dib.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1453/comments | 2 | 2019-01-17T06:50:47Z | 2019-02-12T01:46:59Z | https://github.com/ImageMagick/ImageMagick/issues/1453 | 400,133,504 | 1,453 | [-0.02625642716884613,0.007168920245021582,-0.0018007726175710559,0.03119061328470707,0.027910267934(...TRUNCATED) | 9 | "This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : Potential Memory Leak in Write(...TRUNCATED) | 4,563 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 3