No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ccextractor
Ccextractor ccextractor |
|
| Vendors & Products |
Ccextractor
Ccextractor ccextractor |
Sat, 21 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in CCExtractor up to 0.96.5. Affected is the function processmp4 in the library src/lib_ccx/mp4.c. Performing a manipulation results in use after free. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 0.96.6 is able to address this issue. The patch is named fd7271bae238ccb3ae8a71304ea64f0886324925. You should upgrade the affected component. | |
| Title | CCExtractor mp4.c processmp4 use after free | |
| Weaknesses | CWE-119 CWE-416 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T19:29:40.587Z
Reserved: 2026-02-20T17:14:28.102Z
Link: CVE-2026-2889
Updated: 2026-02-23T19:29:34.642Z
Status : Awaiting Analysis
Published: 2026-02-21T22:15:59.353
Modified: 2026-02-23T18:13:53.397
Link: CVE-2026-2889
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:29:56Z