CVE-2023-3012 – NULL Pointer Dereference in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-3012
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. • https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7 https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 https://www.debian.org/security/2023/dsa-5452 • CWE-476: NULL Pointer Dereference •
CVE-2023-3013 – Unchecked Return Value in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-3013
Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2. • https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594 https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073 • CWE-252: Unchecked Return Value •
CVE-2023-2837 – Stack-based Buffer Overflow in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-2837
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2. • https://github.com/gpac/gpac/commit/6f28c4cd607d83ce381f9b4a9f8101ca1e79c611 https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17 https://www.debian.org/security/2023/dsa-5411 • CWE-121: Stack-based Buffer Overflow •
CVE-2023-2838 – Out-of-bounds Read in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-2838
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. • https://github.com/gpac/gpac/commit/c88df2e202efad214c25b4e586f243b2038779ba https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f https://www.debian.org/security/2023/dsa-5411 • CWE-125: Out-of-bounds Read •
CVE-2023-2839 – Divide By Zero in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-2839
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2. • https://github.com/gpac/gpac/commit/047f96fb39e6bf70cb9f344093f5886e51dce0ac https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f https://www.debian.org/security/2023/dsa-5411 • CWE-369: Divide By Zero •