Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-3707
Deferred
More InfoOfficial Page
Source-cna@vuldb.com
View Known Exploited Vulnerability (KEV) details
Published At-08 Mar, 2026 | 05:16
Updated At-22 Apr, 2026 | 21:27

A vulnerability was identified in MrNanko webp4j up to 1.3.x. The affected element is the function DecodeGifFromMemory of the file src/main/c/gif_decoder.c. Such manipulation of the argument canvas_height leads to integer overflow. Local access is required to approach this attack. The exploit is publicly available and might be used. The name of the patch is 89771b201c66d15d29e4cc016d8aae82b6a5fbe1. It is advisable to implement a patch to correct this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.04.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.3MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Secondary2.04.3MEDIUM
AV:L/AC:L/Au:S/C:P/I:P/A:P
Type: Secondary
Version: 4.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Type: Secondary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-189Primarycna@vuldb.com
CWE-190Primarycna@vuldb.com
CWE ID: CWE-189
Type: Primary
Source: cna@vuldb.com
CWE ID: CWE-190
Type: Primary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/MrNanko/webp4j/cna@vuldb.com
N/A
https://github.com/MrNanko/webp4j/commit/89771b201c66d15d29e4cc016d8aae82b6a5fbe1cna@vuldb.com
N/A
https://github.com/MrNanko/webp4j/issues/6cna@vuldb.com
N/A
https://github.com/MrNanko/webp4j/issues/6#issuecomment-3941945014cna@vuldb.com
N/A
https://github.com/Sp1d3rL1/Webp4j-Heap-Buffer-Overflow/blob/main/README.EN.mdcna@vuldb.com
N/A
https://vuldb.com/?ctiid.349653cna@vuldb.com
N/A
https://vuldb.com/?id.349653cna@vuldb.com
N/A
https://vuldb.com/?submit.765972cna@vuldb.com
N/A
Hyperlink: https://github.com/MrNanko/webp4j/
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/MrNanko/webp4j/commit/89771b201c66d15d29e4cc016d8aae82b6a5fbe1
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/MrNanko/webp4j/issues/6
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/MrNanko/webp4j/issues/6#issuecomment-3941945014
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/Sp1d3rL1/Webp4j-Heap-Buffer-Overflow/blob/main/README.EN.md
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?ctiid.349653
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?id.349653
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?submit.765972
Source: cna@vuldb.com
Resource: N/A
Change History
0Changes found

Details not found