Filtered by vendor Gpac
Subscriptions
Total
348 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-37767 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the BM_ParseIndexValueReplace function at /lib/libgpac.so. | ||||
CVE-2023-37766 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_isom_remove_user_data function at /lib/libgpac.so. | ||||
CVE-2023-37765 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_dump_vrml_sffield function at /lib/libgpac.so. | ||||
CVE-2023-37174 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the dump_isom_scene function at /mp4box/filedump.c. | ||||
CVE-2023-23145 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function. | ||||
CVE-2023-23144 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master. | ||||
CVE-2023-23143 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Buffer overflow vulnerability in function avc_parse_slice in file media_tools/av_parsers.c. GPAC version 2.3-DEV-rev1-g4669ba229-master. | ||||
CVE-2023-1452 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.3 Medium |
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. | ||||
CVE-2023-1449 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.3 Medium |
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability. | ||||
CVE-2023-1448 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.3 Medium |
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability. | ||||
CVE-2023-0866 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV. | ||||
CVE-2023-0819 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV. | ||||
CVE-2023-0818 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV. | ||||
CVE-2023-0817 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV. | ||||
CVE-2023-0770 | 2 Debian, Gpac | 2 Debian Linux, Gpac | 2024-11-21 | 7.8 High |
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2. | ||||
CVE-2023-0760 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. | ||||
CVE-2023-0358 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. | ||||
CVE-2022-4202 | 1 Gpac | 1 Gpac | 2024-11-21 | 6.3 Medium |
A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a patch to fix this issue. VDB-214518 is the identifier assigned to this vulnerability. | ||||
CVE-2022-47663 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609 | ||||
CVE-2022-47662 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 |