Page 9 of 315 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. • https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 https://www.debian.org/security/2023/dsa-5452 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2. • https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26 https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd https://www.debian.org/security/2023/dsa-5411 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master. • https://github.com/gpac/gpac/commit/3a2458a49b3e6399709d456d7b35e7a6f50cfb86 https://www.debian.org/security/2023/dsa-5411 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function. • https://github.com/gpac/gpac/commit/4ade98128cbc41d5115b97a41ca2e59529c8dd5f https://www.debian.org/security/2023/dsa-5411 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. Use After Free en el repositorio de GitHub gpac/gpac anterior a 2.3.0-DEV. • https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 • CWE-416: Use After Free •