{"id":"CVE-2023-51257","details":"An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code.","modified":"2026-04-12T08:24:12.294123Z","published":"2024-01-16T02:15:28.537Z","related":["SUSE-SU-2024:0240-1","SUSE-SU-2024:0241-1","SUSE-SU-2025:3947-1","openSUSE-SU-2024:13576-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/"},{"type":"REPORT","url":"https://github.com/jasper-software/jasper/issues/367"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jasper-software/jasper","events":[{"introduced":"0"},{"last_affected":"917f7708b755d8434f70618108c1a76f1b6a0a82"}],"database_specific":{"cpe":"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"4.1.1"}]}}],"versions":["manual-version-mdadams-20220109-2039","manual-version-mdadams-20221103-1902","mdadams-clang-issue","version-1.900.1","version-1.900.10","version-1.900.11","version-1.900.12","version-1.900.13","version-1.900.14","version-1.900.15","version-1.900.16","version-1.900.17","version-1.900.18","version-1.900.19","version-1.900.2","version-1.900.20","version-1.900.21","version-1.900.22","version-1.900.23","version-1.900.24","version-1.900.25","version-1.900.26","version-1.900.27","version-1.900.28","version-1.900.29","version-1.900.3","version-1.900.30","version-1.900.31","version-1.900.4","version-1.900.5","version-1.900.6","version-1.900.7","version-1.900.8","version-1.900.9","version-2.0.0","version-2.0.0-beta.1","version-2.0.0-beta.2","version-2.0.1","version-2.0.10","version-2.0.11","version-2.0.12","version-2.0.13","version-2.0.14","version-2.0.15","version-2.0.16","version-2.0.19","version-2.0.2","version-2.0.20","version-2.0.21","version-2.0.21-rc1","version-2.0.22","version-2.0.22-rc1","version-2.0.23","version-2.0.24","version-2.0.25","version-2.0.26","version-2.0.27","version-2.0.28","version-2.0.29","version-2.0.3","version-2.0.31","version-2.0.32","version-2.0.33","version-2.0.4","version-2.0.5","version-2.0.6","version-2.0.7","version-2.0.8","version-2.0.9","version-3.0.0","version-3.0.0-rc1","version-3.0.0-rc2","version-3.0.1","version-3.0.2","version-3.0.3","version-3.0.4","version-3.0.5","version-3.0.6","version-4.0.0","version-4.0.0-rc1","version-4.0.1","version-4.0.1-rc1","version-4.1.0","version-4.1.0-rc1","version-4.1.0-rc2","version-4.1.1","version-4.1.1-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-51257.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}