CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Libde265 » Libde265 » 1.0.4 * * * : Security Vulnerabilities

Cpe Name:cpe:2.3:a:libde265:libde265:1.0.4:*:*:*:*:*:*:*
Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2020-21606 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.
2 CVE-2020-21605 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a segmentation fault in the apply_sao_internal function, which can be exploited via a crafted a file.
3 CVE-2020-21604 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl_epi64 function, which can be exploited via a crafted a file.
4 CVE-2020-21603 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
5 CVE-2020-21602 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bipred_16_fallback function, which can be exploited via a crafted a file.
6 CVE-2020-21601 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallback function, which can be exploited via a crafted a file.
7 CVE-2020-21600 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pred_avg_16_fallback function, which can be exploited via a crafted a file.
8 CVE-2020-21599 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file.
9 CVE-2020-21598 787 Overflow 2021-09-16 2021-09-27
6.8
None Remote Medium Not required Partial Partial Partial
libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unweighted_pred_8_sse function, which can be exploited via a crafted a file.
10 CVE-2020-21597 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.
11 CVE-2020-21596 120 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.
12 CVE-2020-21595 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the mc_luma function, which can be exploited via a crafted a file.
13 CVE-2020-21594 787 Overflow 2021-09-16 2021-09-27
4.3
None Remote Medium Not required None None Partial
libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback function, which can be exploited via a crafted a file.
Total number of vulnerabilities : 13   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.