
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in GPAC 2.3-DEV-rev35-gbbca86917-master, identified as CVE-2023-1452. The vulnerability affects the functionality within the file filters/load_text.c and was publicly disclosed in February 2023 (GitHub Issue).
The vulnerability is a buffer overflow issue located in filters/load_text.c at line 353:14. The specific flaw manifests when the index exceeds the bounds of a char array with size 2048. This was confirmed through runtime error detection during security testing (GitHub Issue).
The vulnerability has been classified as critical. When exploited, it can lead to buffer overflow conditions which could potentially result in system compromise or unauthorized code execution (Debian Tracker).
A patch has been released to address this vulnerability. For Debian systems, the fixed version 1.0.1+dfsg1-4+deb11u3 is available for the bullseye release. Users are strongly recommended to apply these updates (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."