Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a | Patch | 
| https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 | Exploit Third Party Advisory | 
| https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a | Patch | 
| https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 08:46
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a - Patch | |
| References | () https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 - Exploit, Third Party Advisory | 
11 Jan 2024, 20:50
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| First Time | Gpac Gpac gpac | |
| CWE | CWE-787 | |
| CPE | cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:* | |
| References | () https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 - Exploit, Third Party Advisory | |
| References | () https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a - Patch | 
08 Jan 2024, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-01-08 13:15
Updated : 2024-11-21 08:46
NVD link : CVE-2024-0321
Mitre link : CVE-2024-0321
CVE.ORG link : CVE-2024-0321
JSON object : View
Products Affected
                gpac
- gpac
