Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2022-24577
GPAC 1.0.1 is affected by a NULL pointer dereference in gf_utf8_wcslen. (gf_utf8_wcslen is a renamed Unicode utf8_wcslen function.)
Exploit prediction scoring system (EPSS) score
EPSS Score
0.002
EPSS Ranking
37.0%
CVSS Severity
CVSS v3 Score
7.8
CVSS v2 Score
6.8
References
https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/share/doc/man/gpac.1#L2226-L2229
https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/src/utils/utf.c#L35-L59
https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/
https://www.debian.org/security/2023/dsa-5411
https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/share/doc/man/gpac.1#L2226-L2229
https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/src/utils/utf.c#L35-L59
https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/
https://www.debian.org/security/2023/dsa-5411
Products affected by CVE-2022-24577
Gpac
»
Gpac
»
Version:
1.0.1
cpe:2.3:a:gpac:gpac:1.0.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved