{"uuid": "3085cb61-26cf-4fd9-b5f3-b12af7c590c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1373", "type": "seen", "source": "https://t.me/cvedetector/18240", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1373 - \"FFmpeg MOV Parser Null Pointer Dereference\"\", \n  \"Content\": \"CVE ID : CVE-2025-1373 \nPublished : Feb. 17, 2025, 4:15 a.m. | 2\u00a0hours, 25\u00a0minutes ago \nDescription : A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-17T08:11:09.000000Z"}