CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
84.6%
A vulnerability in the gf_m2ts_process_sdt() function of the GPAC multimedia platform is related to a buffer overflow in the
heap. Exploitation of the vulnerability could allow an attacker to cause a denial of service
A vulnerability in the gf_fwrite component of the GPAC Multimedia Platform is associated with a heap-based buffer overflow.
heap. Exploitation of the vulnerability, acting remotely, could allow an attacker to cause a denial of
denial of service
A vulnerability in the ISOM_IOD component of the GPAC multimedia platform is related to out-of-bounds writes.
Exploitation of the vulnerability could allow an attacker to cause a denial of service
A vulnerability in the filter/load_text.c file function of the GPAC multimedia platform is related to buffer copying
without checking the input size. Exploitation of the vulnerability could allow an attacker to cause a buffer overflow.
memory
Vulnerability of mp3_dmx_process() function of GPAC multimedia platform is related to heap-based buffer overflow.
heap-based buffer overflow. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of
denial of service
A vulnerability in the gf_av1_reset_state() function of the GPAC Multimedia Platform is related to a memory re-release vulnerability.
memory. Exploitation of the vulnerability could allow an attacker to cause a denial of service
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
84.6%