CVSS 3.1 Score 5.5 of 10 (medium)


Published Sep 1, 2023
Updated: Sep 6, 2023
CWE ID 125


CVE-2023-4721 is a vulnerability categorized as CWE-125 (Out-of-bounds Read) that affects the GitHub repository gpac/gpac prior to version 2.3-DEV. It has a base severity rating of MEDIUM with a base score of 5.5 according to the National Vulnerability Database (NVD) at NIST. The vulnerability requires local access and user interaction, but no privileges are required. It poses a potential danger to organizations as it could lead to a denial of service or other high impact availability issues. The affected products include r9ng1Q, r9ng1R, lIYGJv, pM0SIT, as-tu1, inq4Vv, inq4Vu, pM0SIV, pM0SIU, dLJca3, dLJca4, r9ng1O, r9ng1P, p0dz-g, v2vaPU, v2vaPS, v2vaPT, v2vaPR, ncySnv, ncySnw,n cySnx,n cySny,n cySnz,n cySn0,n cySn1,t 1jDwy,n cySn2,v 2vaPO,s 5UiSg,v 2vaPP,Z uqEjU,Z uqEjV,Z uqEjS,Z uqEjT,Z uqEjR,and n13ykp. No remediation information is available for this vulnerability at the moment.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-4721 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options