This issue affects anyRTC-RTMP-OpenSource: before 1.0.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anyrtcio-community
Anyrtcio-community anyrtc-rtmp-opensource |
|
| Vendors & Products |
Anyrtcio-community
Anyrtcio-community anyrtc-rtmp-opensource |
Tue, 27 Jan 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in anyrtcIO-Community anyRTC-RTMP-OpenSource (third_party/faad2-2.7/libfaad modules). This vulnerability is associated with program files bits.C, syntax.C. This issue affects anyRTC-RTMP-OpenSource: before 1.0. | |
| Title | A heap-based buffer over-read or buffer overflow in tildearrow/furnace | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2026-01-27T21:40:07.901Z
Reserved: 2026-01-27T08:03:38.776Z
Link: CVE-2026-1465
No data.
Status : Deferred
Published: 2026-01-27T09:15:48.330
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-1465
No data.
OpenCVE Enrichment
Updated: 2026-04-18T19:00:08Z