The host is installed with Axiosys Bento4 1.5.1-628 and is prone to a null pointer dereference vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_List:Find located in Core/Ap4List.h. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-628 and is prone to a null pointer dereference vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_BitStream::ReadBytes() in Codecs/Ap4BitStream.cpp. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-628 and is prone to a heap based buffer over read vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_BitStream::ReadBytes() in Codecs/Ap4BitStream.cpp. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-627 and is prone to a heap based buffer over read vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_BitStream::WriteBytes in Codecs/Ap4BitStream.cpp. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-627 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle an issue in Core/Ap4Array.h. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-627 and is prone to a denial of service and program crash vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_AtomListWriter::Action in Core/Ap4Atom.cpp. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-628 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_ElstAtom class in Core/Ap4ElstAtom.cpp. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1-627 and is prone to a memory leak vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1.0 and is prone to a null pointer dereference vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_Descriptor::GetTag in mp42ts. Successful exploitation allows remote attackers to cause unspecified impact.
The host is installed with Axiosys Bento4 1.5.1.0 and is prone to a null pointer dereference vulnerability. A flaw is present in the applications which fails to properly handle an issue in AP4_Descriptor::GetTag in mp42ts. Successful exploitation allows remote attackers to cause unspecified impact.