Логотип exploitDog
bind:CVE-2017-14261
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-14261

Количество 3

Количество 3

ubuntu логотип

CVE-2017-14261

больше 8 лет назад

In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2017-14261

больше 8 лет назад

In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-9x23-24rm-2ggw

больше 3 лет назад

In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-14261

In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-14261

In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
github логотип
GHSA-9x23-24rm-2ggw

In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу