Known Vulnerabilities for Gpac by Gpac

Listed below are 10 of the newest known vulnerabilities associated with the software "Gpac" by "Gpac".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-33366 Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted fil... Not Provided 2021-09-13 2021-09-13
CVE-2021-33365 Memory leak in the gf_isom_get_root_od function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. Not Provided 2021-09-13 2021-09-13
CVE-2021-33364 Memory leak in the def_parent_box_new function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. Not Provided 2021-09-13 2021-09-13
CVE-2021-33363 Memory leak in the infe_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. Not Provided 2021-09-13 2021-09-13
CVE-2021-33362 Stack buffer overflow in the hevc_parse_vps_extension function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of ... Not Provided 2021-09-13 2021-09-13
CVE-2021-33361 Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. Not Provided 2021-09-13 2021-09-13
CVE-2021-32271 An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in o... Not Provided 2021-09-20 2021-09-20
CVE-2021-32270 An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in b... Not Provided 2021-09-20 2021-09-20
CVE-2021-32269 An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump locate... Not Provided 2021-09-20 2021-09-20
CVE-2021-32268 Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary ... Not Provided 2021-09-20 2021-09-29

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGpacGpac1.0AllAllAll
ApplicationGpacGpac0.9.0AllAllAll
ApplicationGpacGpac0.8.0AllAllAll
ApplicationGpacGpac0.7.1AllAllAll
ApplicationGpacGpac0.7.0AllAllAll
ApplicationGpacGpac0.6.1AllAllAll
ApplicationGpacGpac0.6.0AllAllAll
ApplicationGpacGpac0.5.2AllAllAll

Popular searches for Gpac

gpac/gpac

github.com/gpac/gpac

gpac/gpac Modular Multimedia framework for packaging, streaming and playing your favorite content. - gpac gpac

GPAC Project on Advanced Content GitHub Multimedia framework Streaming media Modular programming Wiki Package manager Command-line interface Content (media) Filter (software) Computer file MPEG-4 Part 14 Process (computing) JavaScript Hypertext Transfer Protocol Software repository VRML Scalable Vector Graphics Open-source software MPEG-4 Part 11

GPAC

www.gpac.com

GPAC GPAC G E C, dedicated to clearing the air we breathe. For over three decades GPAC Great Plains Asbestos Control, Inc. GPAC J H F is a full service environmental remediation and demolition company. GPAC offers a range of services to public and private clients that include; building remediation and demolition, plant closure, plant de-commissioning and site reclamation.

Great Plains Athletic Conference Environmental remediation State school Private school Great Plains Athletic Conference (NCAA) Asbestos Kearney, Nebraska Urban area Asbestosis Great Plains Private university Area code 308 Full-service radio Federal government of the United States Plant Asbestos, Quebec Environmental consulting List of federal agencies in the United States Public university Utility player

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report