AimOne Video Converter 2.04 Build 103 contains a buffer overflow vulnerability in its registration form that causes application crashes. Attackers can generate a 7000-byte payload to trigger the denial of service and potentially exploit the software's registration mechanism.
References
| Link | Resource |
|---|---|
| https://aimone-video-converter.software.informer.com/ | Product |
| https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/AimOne/AimOne-Video-Converter-V2.04-Build-103 | Exploit Third Party Advisory |
| https://web.archive.org/web/20180621094013/http://www.aimonesoft.com/ | Product |
| https://www.exploit-db.com/exploits/51196 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/aimone-video-converter-build-buffer-overflow-in-registration-form | Third Party Advisory |
| https://www.exploit-db.com/exploits/51196 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/aimone-video-converter-build-buffer-overflow-in-registration-form | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-02-02 16:16
NVD link : CVE-2023-54328
Mitre link : CVE-2023-54328
CVE.ORG link : CVE-2023-54328
JSON object : View
Products Affected
aimonesoft
- aimone_video_converter
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
