Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54531 | A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gpac:gpac:2.3.0-dev:*:*:*:*:*:*:* |
Fri, 15 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gpac
Gpac gpac |
|
| CPEs | cpe:2.3:a:gpac:gpac:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Gpac
Gpac gpac |
|
| Metrics |
cvssV3_1
|
Fri, 15 Nov 2024 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash. | |
| Title | Use After Free in gpac/gpac | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-11-15T19:12:15.195Z
Reserved: 2023-08-31T15:49:10.614Z
Link: CVE-2023-4679
Updated: 2024-11-15T19:12:09.476Z
Status : Analyzed
Published: 2024-11-15T11:15:08.917
Modified: 2024-11-19T15:54:32.670
Link: CVE-2023-4679
No data.
OpenCVE Enrichment
No data.
EUVD