Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a | Patch |
https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 | Exploit Third Party Advisory |
Configurations
History
11 Jan 2024, 20:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 | |
References | () https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 - Exploit, Third Party Advisory | |
References | () https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a - Patch | |
First Time |
Gpac
Gpac gpac |
|
CPE | cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:* |
08 Jan 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-08 13:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-0321
Mitre link : CVE-2024-0321
CVE.ORG link : CVE-2024-0321
JSON object : View
Products Affected
gpac
- gpac