{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T03:52:47.382","vulnerabilities":[{"cve":{"id":"CVE-2022-3814","sourceIdentifier":"cna@vuldb.com","published":"2022-11-01T22:15:12.193","lastModified":"2024-11-21T07:20:17.287","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in Axiomatic Bento4. This vulnerability affects unknown code of the component mp4decrypt. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212680."},{"lang":"es","value":"Una vulnerabilidad fue encontrada en Axiomatic Bento4 y clasificada como problemática. Esta vulnerabilidad afecta a un código desconocido del componente mp4decrypt. La manipulación conduce a una pérdida de memoria. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-212680."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*","matchCriteriaId":"A003FBD1-339C-409D-A304-7FEE97E23250"}]}]}],"references":[{"url":"https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip","source":"cna@vuldb.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/axiomatic-systems/Bento4/issues/792","source":"cna@vuldb.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://vuldb.com/?id.212680","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/axiomatic-systems/Bento4/issues/792","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://vuldb.com/?id.212680","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}