CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue. | 4.8 |
Medium |
||
libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867. | 8.8 |
High |
||
In Libsixel prior to and including v1.10.3, a NULL pointer dereference in the stb_image.h component of libsixel allows attackers to cause a denial of service (DOS) via a crafted PICT file. | 6.5 |
Medium |
||
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c. | 8.8 |
High |
||
An invalid read in the stb_image.h component of libsixel prior to v1.8.5 allows attackers to cause a denial of service (DOS) via a crafted PSD file. | 6.5 |
Medium |
||
An issue in the dither.c component of libsixel prior to v1.8.4 allows attackers to cause a denial of service (DOS) via a crafted PNG file. | 6.5 |
Medium |
||
A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4. | 6.5 |
Medium |
||
A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4. | 6.5 |
Medium |