5.5
CVSSv3

CVE-2022-1222

Published: 04/04/2022 Updated: 27/05/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Inf loop in GitHub repository gpac/gpac before 2.1.0-DEV.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gpac gpac

Vendor Advisories

Debian Bug report logs - #1016443 gpac: CVE-2022-29339 CVE-2022-29340 CVE-2022-29537 CVE-2022-30976 CVE-2022-1035 CVE-2022-1172 CVE-2022-1222 CVE-2022-1441 CVE-2022-1795 Package: src:gpac; Maintainer for src:gpac is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inu ...
Multiple issues were found in GPAC multimedia framework, which could result in denial of service or potentially the execution of arbitrary code For the stable distribution (bullseye), these problems have been fixed in version 101+dfsg1-4+deb11u2 We recommend that you upgrade your gpac packages For the detailed security status of gpac please re ...

Github Repositories

Config files for my GitHub profile.

tianstcht πŸ‘‹ Hi, I’m @tianstcht πŸ‘€ I’m interested in binary security research 🎩 I‘m a graduate master in BUAA of China 😈 My blog: tianstchtgithubio/ (always forget to update) 😭 I’m currently learning chrome v8 exploitation (it's too hard!) Hack for fun A ctfer and pwner in r3kapig team 2021 0ctf-Quals 4th 2021 0ctf-