{"uuid": "76c32f54-91f4-499d-b055-201f42a15c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1450", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5517", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-1450\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295.\n\ud83d\udccf Published: 2023-03-17T06:47:51.148Z\n\ud83d\udccf Modified: 2025-02-26T14:48:56.132Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.223295\n2. https://vuldb.com/?ctiid.223295\n3. https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc\n4. https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16", "creation_timestamp": "2025-02-26T15:26:25.000000Z"}