[ { "id": 729822594, "name": "Hipcam-RTSP-Format-Validation-Vulnerability", "full_name": "MaximilianJungblut\/Hipcam-RTSP-Format-Validation-Vulnerability", "owner": { "login": "MaximilianJungblut", "id": 62648617, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62648617?v=4", "html_url": "https:\/\/github.com\/MaximilianJungblut", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MaximilianJungblut\/Hipcam-RTSP-Format-Validation-Vulnerability", "description": "This POC exploits a format validation vulnerability in the RTSP service of the Hipcam RealServer\/V1.0, inducing a crash for approximately 45 seconds by injecting random data into the 'client_port' parameter during the RTSP SETUP request. Hipcam RealServer\/V1.0 is used in many Hipcam Cameras. | CVE-2023-50685", "fork": false, "created_at": "2023-12-10T13:21:43Z", "updated_at": "2024-05-02T14:40:08Z", "pushed_at": "2024-05-02T14:40:04Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "camera", "crash", "exploit", "format-validation", "hipcam", "poc", "proof-of-concept", "rtsp", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 } ]