First published: Thu Aug 31 2023(Updated: )
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | <2.3 | |
<2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4681 is medium.
The CWE category for CVE-2023-4681 is 476.
The affected software for CVE-2023-4681 is Gpac Gpac version up to 2.3.
To fix CVE-2023-4681, update to version 2.3 or later of Gpac Gpac.
You can find more information about CVE-2023-4681 at the following links: [GitHub Commit](https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c), [Huntr Dev](https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e).