CVE-2023-1452

Source
https://cve.org/CVERecord?id=CVE-2023-1452
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1452.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-1452
Downstream
Published
2023-03-17T07:15:12.947Z
Modified
2026-03-15T22:44:22.859422Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1452.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "2.3-dev"
            }
        ]
    }
]