cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-22563,https://securityvulnerability.io/vulnerability/CVE-2021-22563,Memory Overread in libjxl,"Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757",Google,Libjxl,4.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2021-11-01T13:15:00.000Z,0 CVE-2021-22564,https://securityvulnerability.io/vulnerability/CVE-2021-22564,Out of bounds Copy in Libjxl in large image groups,"For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775",Google,Libjxl,4.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2021-11-01T13:15:00.000Z,0