
Cloud Vulnerability DB
A community-led vulnerabilities database
A stack-based buffer overflow vulnerability has been identified in saitoha libsixel versions up to 1.10.3. The vulnerability specifically affects the sixel_debug_print_palette function within the src/encoder.c file of the img2sixel component. This vulnerability was disclosed on August 21, 2025, and has been assigned CVE-2025-9300 (NVD).
The vulnerability is classified as a stack-based buffer overflow (CWE-121) and improper restriction of operations within memory bounds (CWE-119). It has received a CVSS v4.0 base score of 4.8 (Medium) with the vector string CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N, and a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L (VulDB).
The vulnerability can result in stack-based buffer overflow conditions, potentially leading to system crashes, code execution, or memory corruption. The impact is rated as Low for confidentiality, integrity, and availability, indicating potential but limited damage to system resources (NVD).
A patch has been identified with the commit ID 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Users are advised to update to a version newer than 1.10.3 to resolve this vulnerability (Github Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."