EPSS
Percentile
50.8%
gpac is vulnerable to stack buffer overflow. The vulnerability exists in src/filters/dmx_nhml.c:1004 in the nhmldmx_send_sample() function szXmlTo parameter which leads to a denial of service vulnerability.
github.com/gpac/gpac/issues/1911
security-tracker.debian.org/tracker/CVE-2021-41456