Vulnerability Description
Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gpac | Gpac | < 2.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514PatchThird Party Advisory
- https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbcExploitThird Party Advisory
- https://www.debian.org/security/2023/dsa-5411
- https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514PatchThird Party Advisory
- https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbcExploitThird Party Advisory
- https://www.debian.org/security/2023/dsa-5411
FAQ
What is CVE-2022-1795?
CVE-2022-1795 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.
How severe is CVE-2022-1795?
CVE-2022-1795 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-1795?
Check the references section above for vendor advisories and patch information. Affected products include: Gpac Gpac.