Browse all 49 CVE security advisories affecting gpac. AI-powered Chinese analysis, POCs, and references for each vulnerability.
gpac serves as an open-source multimedia framework primarily utilized for encoding, decoding, and streaming audio and video content across various platforms. Its widespread adoption in media processing pipelines has exposed it to significant security risks, resulting in forty-nine recorded Common Vulnerabilities and Exposures. Historically, the software has been susceptible to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and memory management errors within its parsing modules. These vulnerabilities allow attackers to execute arbitrary commands or crash systems, compromising data integrity and availability. While no single catastrophic incident dominates its history, the cumulative effect of these bugs highlights the challenges of maintaining complex multimedia libraries. Continuous updates and rigorous code auditing remain essential to mitigate these persistent threats and ensure secure deployment in enterprise environments.
GHSA-35162026-04-28CVE-2026-278212026-02-26CVE-2021-324372025-11-20Showing up to 20 recent security advisories. View all →
This page lists every published CVE security advisory associated with gpac. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.