Known Vulnerabilities for Stb Vorbis by Stb Vorbis Project

Listed below are 8 of the newest known vulnerabilities associated with "Stb Vorbis" by "Stb Vorbis Project".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2019-13223 A reachable assertion in the lookup1_values function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of... 5.5 - MEDIUM 2019-08-15 2023-02-16
CVE-2019-13222 An out-of-bounds read of a global buffer in the draw_line function in stb_vorbis through 2019-03-04 allows an attacker to cau... 7.1 - HIGH 2019-08-15 2023-02-16
CVE-2019-13221 A stack buffer overflow in the compute_codewords function in stb_vorbis through 2019-03-04 allows an attacker to cause a deni... 7.8 - HIGH 2019-08-15 2023-02-16
CVE-2019-13220 Use of uninitialized stack variables in the start_decoder function in stb_vorbis through 2019-03-04 allows an attacker to cau... 7.1 - HIGH 2019-08-15 2023-02-16
CVE-2019-13219 A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial o... 5.5 - MEDIUM 2019-08-15 2023-02-16
CVE-2019-13218 Division by zero in the predict_point function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of servi... 5.5 - MEDIUM 2019-08-15 2023-02-16
CVE-2019-13217 A heap buffer overflow in the start_decoder function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of... 7.8 - HIGH 2019-08-15 2023-02-02
CVE-2018-1000050 Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that ... 8.8 - HIGH 2018-02-09 2018-03-08

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationStb Vorbis ProjectStb Vorbis2019-03-04AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.12AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.11AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.10AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.09AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.08AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.07AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.06AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.05AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.04AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.03AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.02AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.01AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis1.0AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis0.99996AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis0.99995AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis0.99994AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis0.99993AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis0.99992AllAllAll
ApplicationStb Vorbis ProjectStb Vorbis0.99991AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report