Filtered by vendor Gpac
Subscribe
Total
348 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-46001 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. | |||||
CVE-2023-42298 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c. | |||||
CVE-2023-41000 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c. | |||||
CVE-2023-3523 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 7.1 HIGH |
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-3291 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 3.3 LOW |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-3013 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 7.1 HIGH |
Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-3012 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 7.8 HIGH |
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-39562 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a heap-use-after-free via the gf_bs_align function at bitstream.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted file. | |||||
CVE-2023-37767 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the BM_ParseIndexValueReplace function at /lib/libgpac.so. | |||||
CVE-2023-37766 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_isom_remove_user_data function at /lib/libgpac.so. | |||||
CVE-2023-37765 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_dump_vrml_sffield function at /lib/libgpac.so. | |||||
CVE-2023-37174 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the dump_isom_scene function at /mp4box/filedump.c. | |||||
CVE-2023-2840 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 9.8 CRITICAL |
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-2839 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 7.5 HIGH |
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-2838 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 9.1 CRITICAL |
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-2837 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 5.5 MEDIUM |
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2. | |||||
CVE-2023-1655 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 7.8 HIGH |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0. | |||||
CVE-2023-1654 | 1 Gpac | 1 Gpac | 2024-11-21 | N/A | 7.8 HIGH |
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0. | |||||
CVE-2023-1452 | 1 Gpac | 1 Gpac | 2024-11-21 | 4.3 MEDIUM | 5.3 MEDIUM |
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. | |||||
CVE-2023-1449 | 1 Gpac | 1 Gpac | 2024-11-21 | 4.3 MEDIUM | 5.3 MEDIUM |
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability. |