CVSS Score of 10 (low)


Published Jun 16, 2023
Updated: Jul 15, 2023
CWE ID 122
CWE ID 787


CVE-2023-3291 is a heap-based buffer overflow vulnerability in the GitHub repository gpac/gpac prior to version 2.2.2, affecting various products including r9ng1Q, r9ng1R, lIYGJv, pM0SIT, as-tu1, inq4Vv, inq4Vu, pM0SIV, pM0SIU, dLJca3, r9ng1O, dLJca4, r9ng1P, p0dz-g, v2vaPU, v2vaPS, v2vaPT, v2vaPR, ncySnv, ncySnw, ncySnx, ncySny, ncySnz ,ncySn0 ,t1jDwy ,ncySn1 ,ncySn2 ,s5UiSg ,ZuqEjU ,ZuqEjV ,ZuqEjS ,ZuqEjT ,ZuqEjR and n13ykp. This vulnerability can be remediated by updating to version 2.2.2 of the gpac repository. The risk level of this vulnerability is scored at 10 out of 10 and it poses a potential danger to organizations as it allows for a heap-based buffer overflow attack which can lead to remote code execution and compromise the security of affected systems.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-3291 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options