All the vulnerabilites related to gpac - gpac/gpac
cve-2023-4722
Vulnerability from cvelistv5
Published
2023-09-01 15:27
Modified
2024-09-19 15:35
Severity ?
EPSS score ?
Summary
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:38:00.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/de7f3a852bef72a52825fd307cf4e8f486401a76" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4722", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:31:58.108346Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:35:59.542Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-01T15:27:41.694Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830" }, { "url": "https://github.com/gpac/gpac/commit/de7f3a852bef72a52825fd307cf4e8f486401a76" } ], "source": { "advisory": "ddfdb41d-e708-4fec-afe5-68ff1f88f830", "discovery": "EXTERNAL" }, "title": "Integer Overflow or Wraparound in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4722", "datePublished": "2023-09-01T15:27:41.694Z", "dateReserved": "2023-09-01T15:27:34.847Z", "dateUpdated": "2024-09-19T15:35:59.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1654
Vulnerability from cvelistv5
Published
2023-03-27 00:00
Modified
2024-08-02 05:57
Severity ?
EPSS score ?
Summary
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/2c055153d401b8c49422971e3a0159869652d3da" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.4.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service in GitHub repository gpac/gpac prior to 2.4.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14" }, { "url": "https://github.com/gpac/gpac/commit/2c055153d401b8c49422971e3a0159869652d3da" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "33652b56-128f-41a7-afcc-10641f69ff14", "discovery": "EXTERNAL" }, "title": "Denial of Service in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-1654", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-03-27T00:00:00", "dateUpdated": "2024-08-02T05:57:24.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3523
Vulnerability from cvelistv5
Published
2023-07-06 09:53
Modified
2024-11-06 21:49
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/64201a26476c12a7dbd7ffb5757743af6954db96" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-3523", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-31T17:43:30.036859Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T21:49:12.336Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T09:53:48.451Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac" }, { "url": "https://github.com/gpac/gpac/commit/64201a26476c12a7dbd7ffb5757743af6954db96" } ], "source": { "advisory": "57e0be03-8484-415e-8b5c-c1fe4546eaac", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-3523", "datePublished": "2023-07-06T09:53:48.451Z", "dateReserved": "2023-07-06T09:53:37.081Z", "dateUpdated": "2024-11-06T21:49:12.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4682
Vulnerability from cvelistv5
Published
2023-08-31 15:54
Modified
2024-09-19 15:36
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/b1042c3eefca87c4bc32afb404ed6518d693e5be" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4682", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:32:02.751451Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:36:42.852Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T15:54:23.711Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c" }, { "url": "https://github.com/gpac/gpac/commit/b1042c3eefca87c4bc32afb404ed6518d693e5be" } ], "source": { "advisory": "15232a74-e3b8-43f0-ae8a-4e89d56c474c", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4682", "datePublished": "2023-08-31T15:54:23.711Z", "dateReserved": "2023-08-31T15:54:21.283Z", "dateUpdated": "2024-09-19T15:36:42.852Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4681
Vulnerability from cvelistv5
Published
2023-08-31 15:53
Modified
2024-09-19 15:36
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4681", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:32:03.678209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:36:51.215Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T15:53:57.302Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e" }, { "url": "https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c" } ], "source": { "advisory": "d67c5619-ab36-41cc-93b7-04828e25f60e", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4681", "datePublished": "2023-08-31T15:53:57.302Z", "dateReserved": "2023-08-31T15:53:53.132Z", "dateUpdated": "2024-09-19T15:36:51.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2837
Vulnerability from cvelistv5
Published
2023-05-22 00:00
Modified
2024-08-02 06:33
Severity ?
EPSS score ?
Summary
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:33:05.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/6f28c4cd607d83ce381f9b4a9f8101ca1e79c611" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17" }, { "url": "https://github.com/gpac/gpac/commit/6f28c4cd607d83ce381f9b4a9f8101ca1e79c611" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17", "discovery": "EXTERNAL" }, "title": "Stack-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2837", "datePublished": "2023-05-22T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-08-02T06:33:05.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-4043
Vulnerability from cvelistv5
Published
2022-02-04 00:00
Modified
2024-11-08 04:55
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:16:03.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gpac", "vendor": "gpac", "versions": [ { "lessThan": "1.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "debian_linux", "vendor": "debian", "versions": [ { "status": "affected", "version": "11.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2021-4043", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T04:55:06.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "1.1.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47" }, { "url": "https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "d7a534cb-df7a-48ba-8ce3-46b1551a9c47", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2021-4043", "datePublished": "2022-02-04T00:00:00", "dateReserved": "2021-12-02T00:00:00", "dateUpdated": "2024-11-08T04:55:06.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2549
Vulnerability from cvelistv5
Published
2022-07-27 14:51
Modified
2024-08-03 00:39
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537 | x_refsource_CONFIRM | |
https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:39:08.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "v2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-27T14:51:57", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07" } ], "source": { "advisory": "c93083dc-177c-4ba0-ba83-9d7fb29a5537", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2549", "STATE": "PUBLIC", "TITLE": "NULL Pointer Dereference in gpac/gpac" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gpac/gpac", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.1.0-DEV" } ] } } ] }, "vendor_name": "gpac" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537" }, { "name": "https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07", "refsource": "MISC", "url": "https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07" } ] }, "source": { "advisory": "c93083dc-177c-4ba0-ba83-9d7fb29a5537", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2549", "datePublished": "2022-07-27T14:51:57", "dateReserved": "2022-07-27T00:00:00", "dateUpdated": "2024-08-03T00:39:08.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3178
Vulnerability from cvelistv5
Published
2022-09-12 16:30
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0 | x_refsource_CONFIRM | |
https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-12T16:30:12", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3" } ], "source": { "advisory": "f022fc50-3dfd-450a-ab47-3d75d2bf44c0", "discovery": "EXTERNAL" }, "title": "Buffer Over-read in gpac/gpac", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-3178", "STATE": "PUBLIC", "TITLE": "Buffer Over-read in gpac/gpac" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gpac/gpac", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.1.0-DEV" } ] } } ] }, "vendor_name": "gpac" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-126 Buffer Over-read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0" }, { "name": "https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3", "refsource": "MISC", "url": "https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3" } ] }, "source": { "advisory": "f022fc50-3dfd-450a-ab47-3d75d2bf44c0", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3178", "datePublished": "2022-09-12T16:30:12", "dateReserved": "2022-09-12T00:00:00", "dateUpdated": "2024-08-03T01:00:10.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2453
Vulnerability from cvelistv5
Published
2022-07-19 13:30
Modified
2024-08-03 00:39
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a | x_refsource_CONFIRM | |
https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:39:07.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-19T13:30:35", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c" } ], "source": { "advisory": "c8c964de-046a-41b2-9ff5-e25cfdb36b5a", "discovery": "EXTERNAL" }, "title": "Use After Free in gpac/gpac", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-2453", "STATE": "PUBLIC", "TITLE": "Use After Free in gpac/gpac" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gpac/gpac", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.1-DEV" } ] } } ] }, "vendor_name": "gpac" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a" }, { "name": "https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c", "refsource": "MISC", "url": "https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c" } ] }, "source": { "advisory": "c8c964de-046a-41b2-9ff5-e25cfdb36b5a", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2453", "datePublished": "2022-07-19T13:30:35", "dateReserved": "2022-07-17T00:00:00", "dateUpdated": "2024-08-03T00:39:07.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4755
Vulnerability from cvelistv5
Published
2023-09-04 13:46
Modified
2024-09-19 15:35
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4755", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:31:56.089879Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:35:40.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-04T13:46:46.060Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3" }, { "url": "https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a" } ], "source": { "advisory": "463474b7-a4e8-42b6-8b30-e648a77ee6b3", "discovery": "EXTERNAL" }, "title": "Use After Free in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4755", "datePublished": "2023-09-04T13:46:46.060Z", "dateReserved": "2023-09-04T08:24:36.513Z", "dateUpdated": "2024-09-19T15:35:40.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5520
Vulnerability from cvelistv5
Published
2023-10-11 11:56
Modified
2024-09-18 15:46
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-5520", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:11:19.786412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:46:12.905Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:56:06.789Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a" }, { "url": "https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e" } ], "source": { "advisory": "681e42d0-18d4-4ebc-aba0-c5b0f77ac74a", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5520", "datePublished": "2023-10-11T11:56:06.789Z", "dateReserved": "2023-10-11T11:55:58.015Z", "dateUpdated": "2024-09-18T15:46:12.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3012
Vulnerability from cvelistv5
Published
2023-05-31 00:00
Modified
2025-01-09 17:12
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:41:04.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7" }, { "name": "DSA-5452", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5452" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3012", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-09T17:12:11.787791Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-09T17:12:26.107Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-15T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69" }, { "url": "https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7" }, { "name": "DSA-5452", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5452" } ], "source": { "advisory": "916b787a-c603-409d-afc6-25bb02070e69", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-3012", "datePublished": "2023-05-31T00:00:00", "dateReserved": "2023-05-31T00:00:00", "dateUpdated": "2025-01-09T17:12:26.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1655
Vulnerability from cvelistv5
Published
2023-03-27 00:00
Modified
2024-08-02 05:57
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.4.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9" }, { "url": "https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4" } ], "source": { "advisory": "05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-1655", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-03-27T00:00:00", "dateUpdated": "2024-08-02T05:57:24.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4778
Vulnerability from cvelistv5
Published
2023-09-05 15:43
Modified
2024-09-27 13:31
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:38:00.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/d553698050af478049e1a09e44a15ac884f223ed" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4778", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T13:31:49.902230Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T13:31:58.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-05T15:43:08.880Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397" }, { "url": "https://github.com/gpac/gpac/commit/d553698050af478049e1a09e44a15ac884f223ed" } ], "source": { "advisory": "abb450fb-4ab2-49b0-90da-3d878eea5397", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4778", "datePublished": "2023-09-05T15:43:08.880Z", "dateReserved": "2023-09-05T15:42:58.843Z", "dateUpdated": "2024-09-27T13:31:58.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5998
Vulnerability from cvelistv5
Published
2023-11-07 18:45
Modified
2024-09-04 15:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:25.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/db74835944548fc3bdf03121b0e012373bdebb3e" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5998", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T15:20:50.133584Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:21:07.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-07T18:45:03.305Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113" }, { "url": "https://github.com/gpac/gpac/commit/db74835944548fc3bdf03121b0e012373bdebb3e" } ], "source": { "advisory": "ea02a231-b688-422b-a881-ef415bcf6113", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2023-5998", "datePublished": "2023-11-07T18:45:03.305Z", "dateReserved": "2023-11-07T18:44:47.880Z", "dateUpdated": "2024-09-04T15:21:07.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2840
Vulnerability from cvelistv5
Published
2023-05-22 00:00
Modified
2024-08-02 06:33
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:33:05.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/ba59206b3225f0e8e95a27eff41cb1c49ddf9a37" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257" }, { "url": "https://github.com/gpac/gpac/commit/ba59206b3225f0e8e95a27eff41cb1c49ddf9a37" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "21926fc2-6eb1-4e24-8a36-e60f487d0257", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2840", "datePublished": "2023-05-22T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-08-02T06:33:05.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3013
Vulnerability from cvelistv5
Published
2023-05-31 00:00
Modified
2025-01-09 19:42
Severity ?
EPSS score ?
Summary
Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:41:04.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3013", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-09T19:42:06.787078Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-09T19:42:27.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-252", "description": "CWE-252 Unchecked Return Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-31T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073" }, { "url": "https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594" } ], "source": { "advisory": "52f95edc-cc03-4a9f-9bf8-74f641260073", "discovery": "EXTERNAL" }, "title": "Unchecked Return Value in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-3013", "datePublished": "2023-05-31T00:00:00", "dateReserved": "2023-05-31T00:00:00", "dateUpdated": "2025-01-09T19:42:27.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5377
Vulnerability from cvelistv5
Published
2023-10-04 09:53
Modified
2024-09-17 13:49
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to v2.2.2-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/8e9d6b38c036a97020c462ad48e1132e0ddc57ce" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5377", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T13:47:37.672989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T13:49:53.615Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "v2.2.2-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to v2.2.2-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-04T09:53:52.991Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf" }, { "url": "https://github.com/gpac/gpac/commit/8e9d6b38c036a97020c462ad48e1132e0ddc57ce" } ], "source": { "advisory": "fe778df4-3867-41d6-954b-211c81bccbbf", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5377", "datePublished": "2023-10-04T09:53:52.991Z", "dateReserved": "2023-10-04T09:53:41.329Z", "dateUpdated": "2024-09-17T13:49:53.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3222
Vulnerability from cvelistv5
Published
2022-09-15 00:00
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Uncontrolled Recursion in GitHub repository gpac/gpac prior to 2.1.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/4e7736d7ec7bf64026daa611da951993bb42fdaf" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled Recursion in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-674", "description": "CWE-674 Uncontrolled Recursion", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235" }, { "url": "https://github.com/gpac/gpac/commit/4e7736d7ec7bf64026daa611da951993bb42fdaf" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "b29c69fa-3eac-41e4-9d4f-d861aba18235", "discovery": "EXTERNAL" }, "title": "Uncontrolled Recursion in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-3222", "datePublished": "2022-09-15T00:00:00", "dateReserved": "2022-09-15T00:00:00", "dateUpdated": "2024-08-03T01:00:10.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4679
Vulnerability from cvelistv5
Published
2024-11-15 10:53
Modified
2024-11-15 19:12
Severity ?
EPSS score ?
Summary
A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:gpac:gpac:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-4679", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T19:10:48.438721Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T19:12:15.195Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T10:53:32.070Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac" }, { "url": "https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876" } ], "source": { "advisory": "6f721ee7-8785-4c26-801e-f40fed3faaac", "discovery": "EXTERNAL" }, "title": "Use After Free in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2023-4679", "datePublished": "2024-11-15T10:53:32.070Z", "dateReserved": "2023-08-31T15:49:10.614Z", "dateUpdated": "2024-11-15T19:12:15.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5595
Vulnerability from cvelistv5
Published
2023-10-16 08:25
Modified
2024-09-16 16:48
Severity ?
EPSS score ?
Summary
Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/7a6f636db3360bb16d18078d51e8c596f31302a1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5595", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:47:35.286681Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T16:48:15.354Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:25:00.327Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e" }, { "url": "https://github.com/gpac/gpac/commit/7a6f636db3360bb16d18078d51e8c596f31302a1" } ], "source": { "advisory": "0064cf76-ece1-495d-82b4-e4a1bebeb28e", "discovery": "EXTERNAL" }, "title": "Denial of Service in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5595", "datePublished": "2023-10-16T08:25:00.327Z", "dateReserved": "2023-10-16T08:24:48.287Z", "dateUpdated": "2024-09-16T16:48:15.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4720
Vulnerability from cvelistv5
Published
2023-09-01 15:27
Modified
2024-09-19 15:36
Severity ?
EPSS score ?
Summary
Floating Point Comparison with Incorrect Operator in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/e396648e48c57e2d53988d3fd4465b068b96c89a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4720", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:32:00.651083Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:36:24.017Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Floating Point Comparison with Incorrect Operator in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1077", "description": "CWE-1077 Floating Point Comparison with Incorrect Operator", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-01T15:27:40.853Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad" }, { "url": "https://github.com/gpac/gpac/commit/e396648e48c57e2d53988d3fd4465b068b96c89a" } ], "source": { "advisory": "1dc2954c-8497-49fa-b2af-113e1e9381ad", "discovery": "EXTERNAL" }, "title": "Floating Point Comparison with Incorrect Operator in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4720", "datePublished": "2023-09-01T15:27:40.853Z", "dateReserved": "2023-09-01T15:27:30.519Z", "dateUpdated": "2024-09-19T15:36:24.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4754
Vulnerability from cvelistv5
Published
2023-09-04 08:24
Modified
2024-09-19 15:35
Severity ?
EPSS score ?
Summary
Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:38:00.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/7e2e92feb1b30fac1d659f6620d743b5a188ffe0" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4754", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:31:57.113483Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:35:51.496Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-04T08:24:38.003Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c" }, { "url": "https://github.com/gpac/gpac/commit/7e2e92feb1b30fac1d659f6620d743b5a188ffe0" } ], "source": { "advisory": "b7ed24ad-7d0b-40b7-8f4d-3c18a906620c", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Write in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4754", "datePublished": "2023-09-04T08:24:38.003Z", "dateReserved": "2023-09-04T08:24:26.796Z", "dateUpdated": "2024-09-19T15:35:51.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2838
Vulnerability from cvelistv5
Published
2023-05-22 00:00
Modified
2024-08-02 06:33
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:33:05.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/c88df2e202efad214c25b4e586f243b2038779ba" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f" }, { "url": "https://github.com/gpac/gpac/commit/c88df2e202efad214c25b4e586f243b2038779ba" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "711e0988-5345-4c01-a2fe-1179604dd07f", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2838", "datePublished": "2023-05-22T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-08-02T06:33:05.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4756
Vulnerability from cvelistv5
Published
2023-09-04 08:24
Modified
2024-09-19 15:35
Severity ?
EPSS score ?
Summary
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/6914d016e2b540bac2c471c4aea156ddef8e8e01" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4756", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:31:54.983665Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:35:24.697Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-04T08:24:56.615Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05" }, { "url": "https://github.com/gpac/gpac/commit/6914d016e2b540bac2c471c4aea156ddef8e8e01" } ], "source": { "advisory": "2342da0e-f097-4ce7-bfdc-3ec0ba446e05", "discovery": "EXTERNAL" }, "title": "Stack-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4756", "datePublished": "2023-09-04T08:24:56.615Z", "dateReserved": "2023-09-04T08:24:51.810Z", "dateUpdated": "2024-09-19T15:35:24.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4678
Vulnerability from cvelistv5
Published
2023-08-31 15:47
Modified
2024-09-19 15:37
Severity ?
EPSS score ?
Summary
Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/4607052c482a51dbdacfe1ade10645c181d07b07" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4678", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:32:04.682494Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:37:05.077Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-369", "description": "CWE-369 Divide By Zero", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T15:47:53.545Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877" }, { "url": "https://github.com/gpac/gpac/commit/4607052c482a51dbdacfe1ade10645c181d07b07" } ], "source": { "advisory": "688a4a01-8c18-469d-8cbe-a2e79e80c877", "discovery": "EXTERNAL" }, "title": "Divide By Zero in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4678", "datePublished": "2023-08-31T15:47:53.545Z", "dateReserved": "2023-08-31T15:47:42.368Z", "dateUpdated": "2024-09-19T15:37:05.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0321
Vulnerability from cvelistv5
Published
2024-01-08 12:10
Modified
2024-08-01 18:04
Severity ?
EPSS score ?
Summary
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T18:04:49.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T12:10:46.709Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769" }, { "url": "https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a" } ], "source": { "advisory": "4c027b94-8e9c-4c31-a169-893b25047769", "discovery": "EXTERNAL" }, "title": "Stack-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2024-0321", "datePublished": "2024-01-08T12:10:46.709Z", "dateReserved": "2024-01-08T12:06:20.296Z", "dateUpdated": "2024-08-01T18:04:49.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0358
Vulnerability from cvelistv5
Published
2023-01-18 00:00
Modified
2024-08-02 05:10
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:55.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-18T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355" }, { "url": "https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b" } ], "source": { "advisory": "93e128ed-253f-4c42-81ff-fbac7fd8f355", "discovery": "EXTERNAL" }, "title": "Use After Free in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0358", "datePublished": "2023-01-18T00:00:00", "dateReserved": "2023-01-18T00:00:00", "dateUpdated": "2024-08-02T05:10:55.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1795
Vulnerability from cvelistv5
Published
2022-05-18 00:00
Modified
2024-08-03 00:16
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:59.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "v2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc" }, { "url": "https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "9c312763-41a6-4fc7-827b-269eb86efcbc", "discovery": "EXTERNAL" }, "title": "Use After Free in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1795", "datePublished": "2022-05-18T00:00:00", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T00:16:59.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0819
Vulnerability from cvelistv5
Published
2023-02-13 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/d067ab3ccdeaa340e8c045a0fd5bcfc22b809e8f" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "v2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef" }, { "url": "https://github.com/gpac/gpac/commit/d067ab3ccdeaa340e8c045a0fd5bcfc22b809e8f" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "35793610-dccc-46c8-9f55-6a24c621e4ef", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0819", "datePublished": "2023-02-13T00:00:00", "dateReserved": "2023-02-13T00:00:00", "dateUpdated": "2024-08-02T05:24:34.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4721
Vulnerability from cvelistv5
Published
2023-09-01 15:27
Modified
2024-09-19 15:36
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4721", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:31:59.525183Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:36:08.879Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-01T15:27:41.287Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc" }, { "url": "https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63" } ], "source": { "advisory": "f457dc62-3cff-47bd-8fd2-1cb2b4a832fc", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4721", "datePublished": "2023-09-01T15:27:41.287Z", "dateReserved": "2023-09-01T15:27:32.101Z", "dateUpdated": "2024-09-19T15:36:08.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1222
Vulnerability from cvelistv5
Published
2022-04-04 00:00
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835 Loop with Unreachable Exit Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d" }, { "url": "https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d", "discovery": "EXTERNAL" }, "title": "Inf loop in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1222", "datePublished": "2022-04-04T00:00:00", "dateReserved": "2022-04-04T00:00:00", "dateUpdated": "2024-08-02T23:55:24.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0770
Vulnerability from cvelistv5
Published
2023-02-09 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd" }, { "url": "https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "e0fdeee5-7909-446e-9bd0-db80fd80e8dd", "discovery": "EXTERNAL" }, "title": "Stack-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0770", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-02-09T00:00:00", "dateUpdated": "2024-08-02T05:24:34.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0760
Vulnerability from cvelistv5
Published
2023-02-09 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe" }, { "name": "DSA-5452", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5452" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "V2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-15T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21" }, { "url": "https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe" }, { "name": "DSA-5452", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5452" } ], "source": { "advisory": "d06223df-a473-4c82-96d0-23726b844b21", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0760", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-02-09T00:00:00", "dateUpdated": "2024-08-02T05:24:34.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0322
Vulnerability from cvelistv5
Published
2024-01-08 12:38
Modified
2024-08-01 18:04
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T18:04:48.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/092904b80edbc4dce315684a59cc3184c45c1b70" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T12:38:35.128Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec" }, { "url": "https://github.com/gpac/gpac/commit/092904b80edbc4dce315684a59cc3184c45c1b70" } ], "source": { "advisory": "87611fc9-ed7c-43e9-8e52-d83cd270bbec", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2024-0322", "datePublished": "2024-01-08T12:38:35.128Z", "dateReserved": "2024-01-08T12:38:05.505Z", "dateUpdated": "2024-08-01T18:04:48.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2839
Vulnerability from cvelistv5
Published
2023-05-22 00:00
Modified
2024-08-02 06:33
Severity ?
EPSS score ?
Summary
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:33:05.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/047f96fb39e6bf70cb9f344093f5886e51dce0ac" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-369", "description": "CWE-369 Divide By Zero", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f" }, { "url": "https://github.com/gpac/gpac/commit/047f96fb39e6bf70cb9f344093f5886e51dce0ac" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "42dce889-f63d-4ea9-970f-1f20fc573d5f", "discovery": "EXTERNAL" }, "title": "Divide By Zero in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2839", "datePublished": "2023-05-22T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2024-08-02T06:33:05.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0818
Vulnerability from cvelistv5
Published
2023-02-13 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/377ab25f3e502db2934a9cf4b54739e1c89a02ff" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "v2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-193", "description": "CWE-193 Off-by-one Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a" }, { "url": "https://github.com/gpac/gpac/commit/377ab25f3e502db2934a9cf4b54739e1c89a02ff" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "038e7472-f3e9-46c2-9aea-d6dafb62a18a", "discovery": "EXTERNAL" }, "title": "Off-by-one Error in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0818", "datePublished": "2023-02-13T00:00:00", "dateReserved": "2023-02-13T00:00:00", "dateUpdated": "2024-08-02T05:24:34.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4758
Vulnerability from cvelistv5
Published
2023-09-04 15:47
Modified
2024-09-19 15:33
Severity ?
EPSS score ?
Summary
Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:37:59.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4758", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:31:53.953040Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:33:10.151Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-04T15:47:36.284Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6" }, { "url": "https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86" } ], "source": { "advisory": "2f496261-1090-45ac-bc89-cc93c82090d6", "discovery": "EXTERNAL" }, "title": "Buffer Over-read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4758", "datePublished": "2023-09-04T15:47:36.284Z", "dateReserved": "2023-09-04T15:47:26.521Z", "dateUpdated": "2024-09-19T15:33:10.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2454
Vulnerability from cvelistv5
Published
2022-07-19 00:00
Modified
2024-08-03 00:39
Severity ?
EPSS score ?
Summary
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:39:07.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f" }, { "url": "https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "105d40d0-46d7-461e-9f8e-20c4cdea925f", "discovery": "EXTERNAL" }, "title": "Integer Overflow or Wraparound in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-2454", "datePublished": "2022-07-19T00:00:00", "dateReserved": "2022-07-17T00:00:00", "dateUpdated": "2024-08-03T00:39:07.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0817
Vulnerability from cvelistv5
Published
2023-02-13 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/be9f8d395bbd196e3812e9cd80708f06bcc206f7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "v2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3" }, { "url": "https://github.com/gpac/gpac/commit/be9f8d395bbd196e3812e9cd80708f06bcc206f7" } ], "source": { "advisory": "cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3", "discovery": "EXTERNAL" }, "title": "Buffer Over-read in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0817", "datePublished": "2023-02-13T00:00:00", "dateReserved": "2023-02-13T00:00:00", "dateUpdated": "2024-08-02T05:24:34.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5586
Vulnerability from cvelistv5
Published
2023-10-15 00:28
Modified
2024-09-16 20:00
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:31.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5586", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T20:00:36.385989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T20:00:46.418Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-15T00:28:09.002Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740" }, { "url": "https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc" } ], "source": { "advisory": "d2a6ea71-3555-47a6-9b18-35455d103740", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5586", "datePublished": "2023-10-15T00:28:09.002Z", "dateReserved": "2023-10-15T00:27:58.982Z", "dateUpdated": "2024-09-16T20:00:46.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0866
Vulnerability from cvelistv5
Published
2023-02-16 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f" }, { "url": "https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0866", "datePublished": "2023-02-16T00:00:00", "dateReserved": "2023-02-16T00:00:00", "dateUpdated": "2024-08-02T05:24:34.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3291
Vulnerability from cvelistv5
Published
2023-06-16 00:00
Modified
2024-12-17 20:35
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:08.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf" }, { "name": "DSA-5452", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5452" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3291", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T20:35:15.504191Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T20:35:59.161Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-15T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5" }, { "url": "https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf" }, { "name": "DSA-5452", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5452" } ], "source": { "advisory": "526954e6-8683-4697-bfa2-886c3204a1d5", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-3291", "datePublished": "2023-06-16T00:00:00", "dateReserved": "2023-06-16T00:00:00", "dateUpdated": "2024-12-17T20:35:59.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1035
Vulnerability from cvelistv5
Published
2022-03-21 00:00
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpac prior to 2.1.0-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/851942a4-1d64-4553-8fdc-9fccd167864b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/3718d583c6ade191dc7979c64f48c001ca6f0243" }, { "name": "DSA-5411", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/851942a4-1d64-4553-8fdc-9fccd167864b" }, { "url": "https://github.com/gpac/gpac/commit/3718d583c6ade191dc7979c64f48c001ca6f0243" }, { "name": "DSA-5411", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5411" } ], "source": { "advisory": "851942a4-1d64-4553-8fdc-9fccd167864b", "discovery": "EXTERNAL" }, "title": "Segmentation Fault caused by MP4Box -lsr in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1035", "datePublished": "2022-03-21T00:00:00", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-02T23:47:43.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1172
Vulnerability from cvelistv5
Published
2022-03-30 09:30
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264 | x_refsource_CONFIRM | |
https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.1.0-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-30T09:30:16", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8" } ], "source": { "advisory": "a26cb79c-9257-4fbf-98c5-a5a331efa264", "discovery": "EXTERNAL" }, "title": "Null Pointer Dereference Caused Segmentation Fault in gpac/gpac", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1172", "STATE": "PUBLIC", "TITLE": "Null Pointer Dereference Caused Segmentation Fault in gpac/gpac" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gpac/gpac", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.1.0-DEV" } ] } } ] }, "vendor_name": "gpac" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264" }, { "name": "https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8", "refsource": "MISC", "url": "https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8" } ] }, "source": { "advisory": "a26cb79c-9257-4fbf-98c5-a5a331efa264", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1172", "datePublished": "2022-03-30T09:30:16", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-02T23:55:24.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4683
Vulnerability from cvelistv5
Published
2023-08-31 15:54
Modified
2024-09-19 15:36
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922" }, { "tags": [ "x_transferred" ], "url": "https://github.com/gpac/gpac/commit/112767e8b178fc82dec3cf82a1ca14d802cdb8ec" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4683", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:32:01.728287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:36:31.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "gpac/gpac", "vendor": "gpac", "versions": [ { "lessThan": "2.3-DEV", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T15:54:35.386Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922" }, { "url": "https://github.com/gpac/gpac/commit/112767e8b178fc82dec3cf82a1ca14d802cdb8ec" } ], "source": { "advisory": "7852e4d2-af4e-4421-a39e-db23e0549922", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in gpac/gpac" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4683", "datePublished": "2023-08-31T15:54:35.386Z", "dateReserved": "2023-08-31T15:54:32.428Z", "dateUpdated": "2024-09-19T15:36:31.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }