PoC-in-GitHub/2023/CVE-2023-50685.json
2025-01-08 09:32:44 +09:00

43 lines
No EOL
1.7 KiB
JSON

[
{
"id": 729822594,
"name": "Hipcam-RTSP-Format-Validation-Vulnerability",
"full_name": "MaximilianJungblut\/Hipcam-RTSP-Format-Validation-Vulnerability",
"owner": {
"login": "MaximilianJungblut",
"id": 62648617,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62648617?v=4",
"html_url": "https:\/\/github.com\/MaximilianJungblut",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MaximilianJungblut\/Hipcam-RTSP-Format-Validation-Vulnerability",
"description": "This POC exploits a format validation vulnerability in the RTSP service of the Hipcam RealServer\/V1.0, inducing a crash for approximately 45 seconds by injecting random data into the 'client_port' parameter during the RTSP SETUP request. Hipcam RealServer\/V1.0 is used in many Hipcam Cameras. | CVE-2023-50685",
"fork": false,
"created_at": "2023-12-10T13:21:43Z",
"updated_at": "2024-05-02T14:40:08Z",
"pushed_at": "2024-05-02T14:40:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"camera",
"crash",
"exploit",
"format-validation",
"hipcam",
"poc",
"proof-of-concept",
"rtsp",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]