Filtered by vendor Gpac
Subscriptions
Total
346 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-23144 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master. | ||||
CVE-2023-23143 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Buffer overflow vulnerability in function avc_parse_slice in file media_tools/av_parsers.c. GPAC version 2.3-DEV-rev1-g4669ba229-master. | ||||
CVE-2023-1655 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0. | ||||
CVE-2023-1654 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0. | ||||
CVE-2023-1452 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.3 Medium |
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. | ||||
CVE-2023-1449 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.3 Medium |
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability. | ||||
CVE-2023-1448 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.3 Medium |
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability. | ||||
CVE-2023-0866 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV. | ||||
CVE-2023-0841 | 1 Gpac | 1 Gpac | 2024-11-21 | 6.3 Medium |
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087. | ||||
CVE-2023-0819 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV. | ||||
CVE-2023-0818 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV. | ||||
CVE-2023-0817 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV. | ||||
CVE-2023-0770 | 2 Debian, Gpac | 2 Debian Linux, Gpac | 2024-11-21 | 7.8 High |
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2. | ||||
CVE-2023-0760 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. | ||||
CVE-2023-0358 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. | ||||
CVE-2022-4202 | 1 Gpac | 1 Gpac | 2024-11-21 | 6.3 Medium |
A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a patch to fix this issue. VDB-214518 is the identifier assigned to this vulnerability. | ||||
CVE-2022-47663 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609 | ||||
CVE-2022-47662 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 | ||||
CVE-2022-47661 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | ||||
CVE-2022-47660 | 1 Gpac | 1 Gpac | 2024-11-21 | 7.8 High |
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c |