{"id":"CVE-2019-19777","details":"stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.","modified":"2026-04-09T06:39:32.266448Z","published":"2019-12-13T02:15:10.893Z","references":[{"type":"EVIDENCE","url":"https://github.com/saitoha/libsixel/issues/109"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/saitoha/libsixel","events":[{"introduced":"0"},{"last_affected":"6219db6d8416fde3a3b1272e900a76ccdfadec01"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.8.2"}]}}],"versions":["v0.14.0","v0.15.0","v0.16.0","v0.16.1","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.19.2","v0.19.3","v0.19.4","v0.19.5","v0.19.6","v0.20.0","v0.21.0","v0.21.1","v0.22.0","v0.22.1","v0.22.2","v0.22.3","v0.23.0","v0.23.1","v0.23.2","v0.24.0","v0.24.2","v0.25.0","v0.25.1","v0.25.2","v0.25.3","v0.25.4","v0.25.5","v0.26.0","v0.27.0","v0.27.1","v0.28.0","v1.0.0","v1.0.1","v1.0.2","v1.1.0","v1.1.1","v1.1.2","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.4.0","v1.4.1","v1.4.10","v1.4.11","v1.4.12","v1.4.13","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v1.4.7","v1.4.8","v1.4.9","v1.5.0","v1.5.1","v1.5.2","v1.6.1","v1.7.1","v1.7.2","v1.7.3","v1.8.0","v1.8.1","v1.8.2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.23"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19777.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}