uclouvain/openjpeg vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|uclouvain/openjpeg package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of Uninitialized Variable

[,2.5.4)
  • M
NULL Pointer Dereference

[,2.5.1)
  • M
Heap-based Buffer Overflow

[,2.5.3)
  • M
Heap-based Buffer Overflow

[,2.5.3)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • H
Improper Initialization

[,2.5.0)
  • H
Heap-based Buffer Overflow

[,2.5.1)
  • M
Double Free

[,2.1.1)
  • M
NULL Pointer Dereference

[,2.2.0)
  • M
Out-of-bounds Read

[,2.4.0)
  • H
Out-of-bounds Write

[,2.4.0)
  • H
Out-of-bounds Write

[,2.5.0)
  • H
Out-of-bounds Write

[,2.3.0)
  • M
Use After Free

[,2.4.0)
  • M
Denial of Service (DoS)

[,2.3.1)
  • M
Out-of-Bounds

[,2.1.1)
  • M
Integer Overflow or Wraparound

[,2.3.1)
  • H
Out-of-bounds Write

[,2.3.1)
  • M
Out-of-bounds Read

[,2.4.0)
  • C
Out-of-Bounds

[,2.3.1)
  • M
NULL Pointer Dereference

[,2.3.1)
  • M
Out-of-Bounds

[,2.2.0)
  • M
Out-of-bounds Read

[,2.4.0)
  • H
Out-of-Bounds

[0,1.5.2)
  • M
Divide By Zero

[,2.3.1)
  • M
Out-of-Bounds

[,2.2.0)
  • H
Integer Overflow or Wraparound

[,2.3.1)
  • M
Divide By Zero

[,2.2.0)
  • M
NULL Pointer Dereference

[,2.2.0)
  • H
Improper Input Validation

[,2.4.0)
  • M
Improper Input Validation

[,2.3.1)
  • M
Out-of-Bounds

[,2.3.0)
  • H
Out-of-bounds Write

[,2.4.0)
  • M
Heap-based Buffer Overflow

[,2.4.0)
  • H
Out-of-bounds Write

[,2.3.0)
  • H
Out-of-bounds Read

[,2.2.0)
  • M
Denial of Service (DoS)

[0,2.3.1)
  • M
Integer Overflow or Wraparound

[,2.3.1)
  • H
Out-of-Bounds

[,2.2.0)
  • M
Out-of-Bounds

[,2.2.0)
  • H
Out-of-Bounds

[,2.1.2)
  • C
Out-of-bounds Write

[,2.3.1)
  • H
Out-of-bounds Read

[,2.2.0)
  • H
Integer Overflow or Wraparound

[,2.2.0)
  • H
Divide By Zero

[,2.2.0)
  • M
Out-of-Bounds

[,2.1.1)
  • H
NULL Pointer Dereference

[,2.2.0)
  • H
Divide By Zero

[,2.3.1)
  • H
Heap-based Buffer Overflow

[,2.4.0)
  • M
Out-of-bounds Read

[,2.4.0)
  • M
Integer Overflow or Wraparound

[,2.5.0)
  • H
NULL Pointer Dereference

[,2.2.0)
  • H
Improper Input Validation

[,2.4.0)
  • H
Out-of-bounds Write

[,2.3.1)
  • M
Out-of-Bounds

[,2.2.0)
  • H
Out-of-Bounds

[,2.3.0)
  • M
NULL Pointer Dereference

[,2.2.0)
  • H
Out-of-Bounds

[,2.3.0)
  • H
Out-of-bounds Write

[,2.3.0)
  • H
Out-of-bounds Write

[,2.3.0)
  • C
Out-of-bounds Write

[,2.3.1)
  • M
NULL Pointer Dereference

[,2.2.0)
  • C
Use After Free

[,2.1.1)
  • M
Out-of-bounds Read

[,2.1.1)
  • M
Divide By Zero

[,2.1.1)
  • M
Denial of Service (DoS)

[,2.5.0)
  • M
Out-of-Bounds

[,2.1.1)
  • H
NULL Pointer Dereference

[,2.2.0)
  • M
Integer Overflow or Wraparound

[,2.2.0)