GPAC v1.1.0 was discovered to contain an invalid call in the function gf_node_changed(). This vulnerability can lead to a Denial of Service (DoS).
https://www.debian.org/security/2023/dsa-5411
https://github.com/gpac/gpac/issues/1974
Source: Mitre, NVD
Published: 2022-01-14
Updated: 2023-08-08
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: Medium
Base Score: 5.5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H