Page 15 of 341 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. Use After Free en el repositorio de GitHub gpac/gpac anterior a 2.3.0-DEV. • https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113 • https://github.com/gpac/gpac/issues/2349 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 • https://github.com/gpac/gpac/issues/2355 https://www.debian.org/security/2023/dsa-5411 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data • https://github.com/gpac/gpac/issues/2354 https://www.debian.org/security/2023/dsa-5411 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes • https://github.com/gpac/gpac/issues/2358 https://www.debian.org/security/2023/dsa-5411 • CWE-787: Out-of-bounds Write •