First published: Mon Oct 16 2023(Updated: )
Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | <2.3.0 | |
<2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5595 is medium with a CVSS score of 5.1.
To fix CVE-2023-5595, update the GitHub repository gpac/gpac to version 2.3.0-DEV or newer.
CVE-2023-5595 can cause a Denial of Service (DoS) in the GitHub repository gpac/gpac prior to version 2.3.0-DEV.
The Common Weakness Enumeration (CWE) ID of CVE-2023-5595 is CWE-400.
You can find more information about CVE-2023-5595 at the following references: [Reference 1](https://github.com/gpac/gpac/commit/7a6f636db3360bb16d18078d51e8c596f31302a1) and [Reference 2](https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e).