Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q4m9-3fr6-f83p

Опубликовано: 26 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 1.9
CVSS3: 3.3

Описание

A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.

A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.

EPSS

Процентиль: 4%
0.00019
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-404
CWE-476

Связанные уязвимости

CVSS3: 3.3
ubuntu
14 дней назад

A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.

CVSS3: 3.3
nvd
14 дней назад

A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.

CVSS3: 3.3
debian
14 дней назад

A security flaw has been discovered in GPAC up to 2.4.0. Affected by t ...

EPSS

Процентиль: 4%
0.00019
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-404
CWE-476