Filtered by vendor Gpac Subscriptions
Total 346 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-3291 1 Gpac 1 Gpac 2024-08-02 3.3 Low
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-3012 1 Gpac 1 Gpac 2024-08-02 7.8 High
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-3013 1 Gpac 1 Gpac 2024-08-02 7.1 High
Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-2839 1 Gpac 1 Gpac 2024-08-02 7.5 High
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-2837 1 Gpac 1 Gpac 2024-08-02 5.5 Medium
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-2840 1 Gpac 1 Gpac 2024-08-02 9.8 Critical
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-2838 1 Gpac 1 Gpac 2024-08-02 9.1 Critical
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
CVE-2023-1655 1 Gpac 1 Gpac 2024-08-02 7.8 High
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
CVE-2023-1654 1 Gpac 1 Gpac 2024-08-02 7.8 High
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.
CVE-2023-1448 1 Gpac 1 Gpac 2024-08-02 5.3 Medium
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
CVE-2023-1449 1 Gpac 1 Gpac 2024-08-02 5.3 Medium
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
CVE-2023-1452 1 Gpac 1 Gpac 2024-08-02 5.3 Medium
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
CVE-2023-0866 1 Gpac 1 Gpac 2024-08-02 7.8 High
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV.
CVE-2023-0817 1 Gpac 1 Gpac 2024-08-02 7.8 High
Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV.
CVE-2023-0841 1 Gpac 1 Gpac 2024-08-02 6.3 Medium
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087.
CVE-2023-0818 1 Gpac 1 Gpac 2024-08-02 5.5 Medium
Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV.
CVE-2023-0819 1 Gpac 1 Gpac 2024-08-02 7.8 High
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV.
CVE-2023-0770 2 Debian, Gpac 2 Debian Linux, Gpac 2024-08-02 7.8 High
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
CVE-2023-0760 1 Gpac 1 Gpac 2024-08-02 7.8 High
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
CVE-2023-0358 1 Gpac 1 Gpac 2024-08-02 7.8 High
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.