gpac v2.2.1 was discovered to contain a Use-After-Free (UAF) vulnerability via the dasher_configure_pid function at /src/filters/dasher.c.
References
Link | Resource |
---|---|
https://github.com/yinluming13579/gpac_defects/blob/main/gpac_2.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-05 18:15
Updated : 2024-02-07 23:28
NVD link : CVE-2024-24266
Mitre link : CVE-2024-24266
CVE.ORG link : CVE-2024-24266
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-416
Use After Free