CVSS 3.1 Score 7.1 of 10 (high)


Published Oct 11, 2023
Updated: Oct 13, 2023
CWE ID 125


CVE-2023-5520 is a vulnerability categorized as CWE-125 (Out-of-bounds Read) and has a high severity base score of 7.1. It affects the GitHub repository gpac/gpac prior to version 2.2.2. A total of 53 hits have been recorded for this vulnerability. It impacts a variety of products, including r9ng1Q, r9ng1R, lIYGJv, pM0SIT, as-tu1, inq4Vv, inq4Vu, pM0SIV, pM0SIU, dLJca3, dLJca4, r9ng1O, r9ng1P, p0dz-g, ncySnv, ncySnw, ncySnx, ncySny, ncySnz, ncySn0, ncySn1, t1jDwy, ncySn2 s5UiSg,ZuqEjU,ZuqEjV,ZuqEjS,ZuqEjT,n13ykp,and ZuqEjR. The vulnerability has an exploitability score of 1.8 and requires user interaction to be exploited successfully. It poses a potential danger to organizations due to its high confidentiality impact and availability impact rating. No remediation information or specific potential dangers are provided for this vulnerability at this time.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-5520 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options