Known Vulnerabilities for Bento4 by Axiosys

Listed below are 10 of the newest known vulnerabilities associated with "Bento4" by "Axiosys".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-29576 Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4... Not Provided 2023-04-11 2023-04-11
CVE-2023-29575 Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component. Not Provided 2023-04-21 2023-04-21
CVE-2023-29574 Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component. Not Provided 2023-04-12 2023-04-12
CVE-2023-29573 Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component. Not Provided 2023-04-13 2023-04-13
CVE-2021-40943 In Bento4 1.6.0-638, there is a null pointer reference in the function AP4_DescriptorListInspector::Action function in Ap4Des... 5.5 - MEDIUM 2022-06-28 2022-07-07
CVE-2021-40941 In Bento4 1.6.0-638, there is an allocator is out of memory in the function AP4_Array::EnsureCapacity in... 7.5 - HIGH 2022-06-27 2022-07-07
CVE-2021-35307 An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the AP4_DescriptorFinder::Test com... 6.5 - MEDIUM 2021-08-05 2021-08-12
CVE-2021-35306 An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the function AP4_StszAtom::WriteFi... 6.5 - MEDIUM 2021-08-05 2021-08-12
CVE-2021-32265 An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::W... 8.8 - HIGH 2021-09-20 2021-09-29
CVE-2020-19721 A heap buffer overflow vulnerability in Ap4TrunAtom.cpp of Bento 1.5.1-628 may lead to an out-of-bounds write while running m... 6.5 - MEDIUM 2021-07-13 2022-10-26

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language

Popular searches for Bento4

About | Bento4

About | Bento4 This software is available under two different licenses For applications that are entirely distributable under the terms of the GPL, the Bento4 GPL license applies. For applications that cannot be entirely distributable under the terms of the GPL either the application, or code modules linked with the application are not compatible with the terms of the GPL licence , a non-GPL commercial license is available from Axiomatic Systems LLC. Contact Gilles Boccon-Gibod [email protected] axiosys & $.com. 2016 Axiomatic Systems LLC.

GNU General Public License Application software Dynamic Adaptive Streaming over HTTP Software license Limited liability company Software Commercial software Modular programming License HTTP Live Streaming License compatibility Source code Documentation Digital rights management Internet Information Services Encryption Linker (computing) Programmer Subtitle Software documentation

Vulnerability Summary for the Week of August 12, 2019 | CISA

@ Vulnerability (computing) Common Vulnerabilities and Exposures Common Vulnerability Scoring System Plug-in (computing) WordPress ISACA Cross-site scripting Arbitrary code execution Website CODESYS National Institute of Standards and Technology HPE 3PAR Information User (computing) Software SQL injection Microsoft Windows Security hacker Denial-of-service attack Library (computing)

© 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status