Page 2 of 63 results (0.007 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc. Se descubrió que Libde265 v1.0.14 contenía una vulnerabilidad de desbordamiento del búfer de almacenamiento dinámico en la función derive_combined_bipredictive_merging_candidates en motion.cc. • https://github.com/strukturag/libde265/issues/434 https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Libde265 v1.0.14 was discovered to contain a global buffer overflow vulnerability in the read_coding_unit function at slice.cc. Se descubrió que Libde265 v1.0.14 contenía una vulnerabilidad de desbordamiento de búfer global en la función read_coding_unit en slice.cc. • https://github.com/strukturag/libde265/issues/432 https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump. Se descubrió que Libde265 v1.0.12 contenía múltiples desbordamientos del búfer a través de los parámetros num_tile_columns y num_tile_row en la función pic_parameter_set::dump. • https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133 https://github.com/strukturag/libde265/issues/418 https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component. Vulnerabilidad de desbordamiento del búfer en strukturag libde265 v1.10.12 permite que un atacante local provoque una denegación de servicio a través de la función slice_segment_header en el componente slice.cc. • https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 https://github.com/strukturag/libde265/issues/426 https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 1

A Segmentation fault caused by a floating point exception exists in libheif 1.15.1 using crafted heif images via the heif::Fraction::round() function in box.cc, which causes a denial of service. • https://github.com/strukturag/libheif/issues/794 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAE6NQBA3Q7GS6VTNDZRZZZVPPEFUEZ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LGKHDCS4HRZE3UGXYYDYPTIPNIBRLQ5L • CWE-369: Divide By Zero •