Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 28 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:* |
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gpac
Gpac gpac |
|
| Vendors & Products |
Gpac
Gpac gpac |
Mon, 26 Jan 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in GPAC up to 2.4.0. Affected by this issue is the function dump_isom_rtp of the file applications/mp4box/filedump.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. Patch name: f96bd57c3ccdcde4335a0be28cd3e8fe296993de. Applying a patch is the recommended action to fix this issue. | |
| Title | GPAC filedump.c dump_isom_rtp null pointer dereference | |
| Weaknesses | CWE-404 CWE-476 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:56:11.664Z
Reserved: 2026-01-25T09:56:56.395Z
Link: CVE-2026-1417
Updated: 2026-01-26T15:22:20.568Z
Status : Modified
Published: 2026-01-26T04:16:10.180
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-1417
No data.
OpenCVE Enrichment
Updated: 2026-04-18T15:15:03Z