Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 28 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:* |
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gpac
Gpac gpac |
|
| Vendors & Products |
Gpac
Gpac gpac |
Mon, 26 Jan 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue. | |
| Title | GPAC filedump.c DumpMovieInfo null pointer dereference | |
| Weaknesses | CWE-404 CWE-476 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:55:57.311Z
Reserved: 2026-01-25T09:55:16.575Z
Link: CVE-2026-1416
Updated: 2026-01-26T15:26:42.439Z
Status : Modified
Published: 2026-01-26T04:16:09.960
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-1416
No data.
OpenCVE Enrichment
Updated: 2026-04-18T19:00:08Z