
Cloud Vulnerability DB
A community-led vulnerabilities database
Out-of-bounds Read vulnerability (CVE-2024-0322) was identified in GitHub repository gpac/gpac prior to version 2.3-DEV. The vulnerability was disclosed on January 8, 2024, and affects the GPAC software package. The vulnerability has received a CVSS v3.1 base score of 9.1 (Critical) from NVD, indicating a high severity issue (NVD).
The vulnerability is classified as an Out-of-bounds Read (CWE-125) issue. According to the CVSS v3.1 metrics, the vulnerability has the following characteristics: Network attack vector, Low attack complexity, requires No privileges, and No user interaction. The vulnerability has a Unchanged scope with High impact on confidentiality and availability, but No impact on integrity (NVD).
The vulnerability can potentially lead to unauthorized access to information beyond intended boundaries through out-of-bounds read operations. With a CVSS score of 9.1, it poses significant risks to system confidentiality and availability (NVD).
A fix has been implemented and is available in the GPAC repository through commit 092904b80edbc4dce315684a59cc3184c45c1b70. Users are advised to upgrade to version 2.3-DEV or later to address this vulnerability (Github Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."