Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

gpac — Vulnerabilities & Security Advisories 49

Browse all 49 CVE security advisories affecting gpac. AI-powered Chinese analysis, POCs, and references for each vulnerability.

gpac serves as an open-source multimedia framework primarily utilized for encoding, decoding, and streaming audio and video content across various platforms. Its widespread adoption in media processing pipelines has exposed it to significant security risks, resulting in forty-nine recorded Common Vulnerabilities and Exposures. Historically, the software has been susceptible to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and memory management errors within its parsing modules. These vulnerabilities allow attackers to execute arbitrary commands or crash systems, compromising data integrity and availability. While no single catastrophic incident dominates its history, the cumulative effect of these bugs highlights the challenges of maintaining complex multimedia libraries. Continuous updates and rigorous code auditing remain essential to mitigate these persistent threats and ensure secure deployment in enterprise environments.

Top products by gpac: gpac/gpac gpac
CVE IDTitleCVSSSeverityPublished
CVE-2023-1655 Heap-based Buffer Overflow in gpac/gpac — gpac/gpacCWE-122 7.8 -2023-03-27
CVE-2023-1654 Denial of Service in gpac/gpac — gpac/gpacCWE-400 5.5 -2023-03-27
CVE-2023-0866 Heap-based Buffer Overflow in gpac/gpac — gpac/gpacCWE-122 7.8 -2023-02-16
CVE-2023-0819 Heap-based Buffer Overflow in gpac/gpac — gpac/gpacCWE-122 7.8 -2023-02-13
CVE-2023-0818 Off-by-one Error in gpac/gpac — gpac/gpacCWE-193 7.1 -2023-02-13
CVE-2023-0817 Buffer Over-read in gpac/gpac — gpac/gpacCWE-126 7.8 -2023-02-13
CVE-2023-0770 Stack-based Buffer Overflow in gpac/gpac — gpac/gpacCWE-121 7.8 -2023-02-09
CVE-2023-0760 Heap-based Buffer Overflow in gpac/gpac — gpac/gpacCWE-122 7.8 -2023-02-09
CVE-2023-0358 Use After Free in gpac/gpac — gpac/gpacCWE-416 7.8 -2023-01-18
CVE-2022-3222 Uncontrolled Recursion in gpac/gpac — gpac/gpacCWE-674 5.5 -2022-09-15
CVE-2022-3178 Buffer Over-read in gpac/gpac — gpac/gpacCWE-126 7.8 -2022-09-12
CVE-2022-2549 NULL Pointer Dereference in gpac/gpac — gpac/gpacCWE-476 5.5 -2022-07-27
CVE-2022-2453 Use After Free in gpac/gpac — gpac/gpacCWE-416 7.8 -2022-07-19
CVE-2022-2454 Integer Overflow or Wraparound in gpac/gpac — gpac/gpacCWE-190 7.8 -2022-07-19
CVE-2022-1795 Use After Free in gpac/gpac — gpac/gpacCWE-416 7.8 -2022-05-18
CVE-2022-1222 Inf loop in gpac/gpac — gpac/gpacCWE-835 5.5 -2022-04-04
CVE-2022-1172 Null Pointer Dereference Caused Segmentation Fault in gpac/gpac — gpac/gpacCWE-476 5.5 -2022-03-30
CVE-2022-1035 Segmentation Fault caused by MP4Box -lsr in gpac/gpac — gpac/gpacCWE-476 5.5 -2022-03-21
CVE-2021-4043 NULL Pointer Dereference in gpac/gpac — gpac/gpacCWE-476 5.5 -2022-02-04

This page lists every published CVE security advisory associated with gpac. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.