CVE ID | Publié | Description | Score | Gravité |
---|---|---|---|---|
libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867. | 8.8 |
Haute |
||
In Libsixel prior to and including v1.10.3, a NULL pointer dereference in the stb_image.h component of libsixel allows attackers to cause a denial of service (DOS) via a crafted PICT file. | 6.5 |
Moyen |
||
An invalid read in the stb_image.h component of libsixel prior to v1.8.5 allows attackers to cause a denial of service (DOS) via a crafted PSD file. | 6.5 |
Moyen |
||
A heap-based buffer overflow in the sixel_encoder_output_without_macro function in encoder.c of Libsixel 1.8.4 allows attackers to cause a denial of service (DOS) via converting a crafted PNG file into Sixel format. | 6.5 |
Moyen |
||
libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c. | 8.8 |
Haute |
||
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c. | 8.8 |
Haute |
||
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c. | 8.8 |
Haute |