Filtered by vendor Struktur
Subscriptions
Filtered by product Libde265
Subscriptions
Total
53 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-24754 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2025-03-07 | 5.5 Medium |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | ||||
CVE-2023-24751 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2025-03-07 | 6.5 Medium |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | ||||
CVE-2023-24752 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2025-03-07 | 5.5 Medium |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | ||||
CVE-2023-25221 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2025-03-07 | 7.8 High |
Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc. | ||||
CVE-2022-47665 | 1 Struktur | 1 Libde265 | 2025-03-07 | 7.8 High |
Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int) | ||||
CVE-2022-47664 | 1 Struktur | 1 Libde265 | 2025-03-07 | 7.8 High |
Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse | ||||
CVE-2023-24757 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2025-03-07 | 5.5 Medium |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | ||||
CVE-2023-43887 | 1 Struktur | 1 Libde265 | 2024-11-26 | 8.1 High |
Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump. | ||||
CVE-2023-49468 | 1 Struktur | 1 Libde265 | 2024-11-21 | 8.8 High |
Libde265 v1.0.14 was discovered to contain a global buffer overflow vulnerability in the read_coding_unit function at slice.cc. | ||||
CVE-2023-49467 | 1 Struktur | 1 Libde265 | 2024-11-21 | 8.8 High |
Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc. | ||||
CVE-2023-49465 | 1 Struktur | 1 Libde265 | 2024-11-21 | 8.8 High |
Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function at motion.cc. | ||||
CVE-2023-47471 | 1 Struktur | 1 Libde265 | 2024-11-21 | 6.5 Medium |
Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component. | ||||
CVE-2023-27103 | 1 Struktur | 1 Libde265 | 2024-11-21 | 8.8 High |
Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc. | ||||
CVE-2023-27102 | 1 Struktur | 1 Libde265 | 2024-11-21 | 6.5 Medium |
Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc. | ||||
CVE-2022-1253 | 1 Struktur | 1 Libde265 | 2024-11-21 | 9.8 Critical |
Heap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release. | ||||
CVE-2021-36411 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2024-11-21 | 5.5 Medium |
An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | ||||
CVE-2021-36410 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2024-11-21 | 5.5 Medium |
A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265. | ||||
CVE-2021-36409 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2024-11-21 | 7.8 High |
There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file or possibly have unspecified other impact. | ||||
CVE-2021-36408 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2024-11-21 | 5.5 Medium |
An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265. | ||||
CVE-2021-35452 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2024-11-21 | 6.5 Medium |
An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to a SEGV in slice.cc. |