nothings CVE Vulnerabilities & Metrics

Focus on nothings vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About nothings Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with nothings. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total nothings CVEs: 33
Earliest CVE date: 12 Sep 2018, 23:29 UTC
Latest CVE date: 25 Oct 2023, 18:17 UTC

Latest CVE reference: CVE-2023-43281

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical nothings CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.08

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 16
4.0-6.9 17
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS nothings CVEs

These are the five CVEs with the highest CVSS scores for nothings, sorted by severity first and recency.

All CVEs for nothings

CVE-2023-43281 nothings vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Double Free vulnerability in Nothings Stb Image.h v.2.28 allows a remote attacker to cause a denial of service via a crafted file to the stbi_load_gif_main function.

CVE-2023-45682 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds read in `DECODE` macro when `var` is negative. As it can be seen in the definition of `DECODE_RAW` a negative `var` is a valid value. This issue may be used to leak internal memory allocation information.

CVE-2023-45681 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in `start_decoder`. The root cause is a potential integer overflow in `sizeof(char*) * (f->comment_list_length)` which may make `setup_malloc` allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force `setup_malloc` to return 0 and make the exploit more reliable. This issue may lead to code execution.

CVE-2023-45680 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory allocation failure in `start_decoder`. In that case the function returns early, the `f->comment_list` is set to `NULL`, but `f->comment_list_length` is not reset. Later in `vorbis_deinit` it tries to dereference the `NULL` pointer. This issue may lead to denial of service.

CVE-2023-45679 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory allocation failure in `start_decoder`. In that case the function returns early, but some of the pointers in `f->comment_list` are left initialized and later `setup_free` is called on these pointers in `vorbis_deinit`. This issue may lead to code execution.

CVE-2023-45678 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of buffer write in `start_decoder` because at maximum `m->submaps` can be 16 but `submap_floor` and `submap_residue` are declared as arrays of 15 elements. This issue may lead to code execution.

CVE-2023-45677 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[len] = (char)'\0';`. The root cause is that if `len` read in `start_decoder` is a negative number and `setup_malloc` successfully allocates memory in that case, but memory write is done with a negative index `len`. Similarly if len is INT_MAX the integer overflow len+1 happens in `f->vendor = (char*)setup_malloc(f, sizeof(char) * (len+1));` and `f->comment_list[i] = (char*)setup_malloc(f, sizeof(char) * (len+1));`. This issue may lead to code execution.

CVE-2023-45676 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[i] = get8_packet(f);`. The root cause is an integer overflow in `setup_malloc`. A sufficiently large value in the variable `sz` overflows with `sz+7` in and the negative value passes the maximum available memory buffer check. This issue may lead to code execution.

CVE-2023-45675 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[len] = (char)'\0';`. The root cause is that if the len read in `start_decoder` is `-1` and `len + 1` becomes 0 when passed to `setup_malloc`. The `setup_malloc` behaves differently when `f->alloc.alloc_buffer` is pre-allocated. Instead of returning `NULL` as in `malloc` case it shifts the pre-allocated buffer by zero and returns the currently available memory block. This issue may lead to code execution.

CVE-2023-45667 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_image is a single file MIT licensed library for processing images. If `stbi__load_gif_main` in `stbi_load_gif_from_memory` fails it returns a null pointer and may keep the `z` variable uninitialized. In case the caller also sets the flip vertically flag, it continues and calls `stbi__vertical_flip_slices` with the null pointer result value and the uninitialized `z` value. This may result in a program crash.

CVE-2023-45666 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_image is a single file MIT licensed library for processing images. It may look like `stbi__load_gif_main` doesn’t give guarantees about the content of output value `*delays` upon failure. Although it sets `*delays` to zero at the beginning, it doesn’t do it in case the image is not recognized as GIF and a call to `stbi__load_gif_main_outofmem` only frees possibly allocated memory in `*delays` without resetting it to zero. Thus it would be fair to say the caller of `stbi__load_gif_main` is responsible to free the allocated memory in `*delays` only if `stbi__load_gif_main` returns a non null value. However at the same time the function may return null value, but fail to free the memory in `*delays` if internally `stbi__convert_format` is called and fails. Thus the issue may lead to a memory leak if the caller chooses to free `delays` only when `stbi__load_gif_main` didn’t fail or to a double-free if the `delays` is always freed

CVE-2023-45664 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_image is a single file MIT licensed library for processing images. A crafted image file can trigger `stbi__load_gif_main_outofmem` attempt to double-free the out variable. This happens in `stbi__load_gif_main` because when the `layers * stride` value is zero the behavior is implementation defined, but common that realloc frees the old memory and returns null pointer. Since it attempts to double-free the memory a few lines below the first “free”, the issue can be potentially exploited only in a multi-threaded environment. In the worst case this may lead to code execution.

CVE-2023-45663 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_image is a single file MIT licensed library for processing images. The stbi__getn function reads a specified number of bytes from context (typically a file) into the specified buffer. In case the file stream points to the end, it returns zero. There are two places where its return value is not checked: In the `stbi__hdr_load` function and in the `stbi__tga_load` function. The latter of the two is likely more exploitable as an attacker may also control the size of an uninitialized buffer.

CVE-2023-45662 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_image is a single file MIT licensed library for processing images. When `stbi_set_flip_vertically_on_load` is set to `TRUE` and `req_comp` is set to a number that doesn’t match the real number of components per pixel, the library attempts to flip the image vertically. A crafted image file can trigger `memcpy` out-of-bounds read because `bytes_per_pixel` used to calculate `bytes_per_row` doesn’t match the real image array dimensions.

CVE-2023-45661 nothings vulnerability CVSS: 0 21 Oct 2023, 00:15 UTC

stb_image is a single file MIT licensed library for processing images. A crafted image file may trigger out of bounds memcpy read in `stbi__gif_load_next`. This happens because two_back points to a memory address lower than the start of the buffer out. This issue may be used to leak internal memory allocation information.

CVE-2023-43898 nothings vulnerability CVSS: 0 03 Oct 2023, 21:15 UTC

Nothings stb 2.28 was discovered to contain a Null Pointer Dereference via the function stbi__convert_format. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted pic file.

CVE-2022-28042 nothings vulnerability CVSS: 6.8 15 Apr 2022, 14:15 UTC

stb_image.h v2.27 was discovered to contain an heap-based use-after-free via the function stbi__jpeg_huff_decode.

CVE-2022-28041 nothings vulnerability CVSS: 4.3 15 Apr 2022, 14:15 UTC

stb_image.h v2.27 was discovered to contain an integer overflow via the function stbi__jpeg_decode_block_prog_dc. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

CVE-2022-25516 nothings vulnerability CVSS: 5.0 17 Mar 2022, 01:15 UTC

stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function stbtt__find_table at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.

CVE-2022-25515 nothings vulnerability CVSS: 5.0 17 Mar 2022, 01:15 UTC

stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttULONG() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.

CVE-2022-25514 nothings vulnerability CVSS: 5.0 17 Mar 2022, 01:15 UTC

stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttUSHORT() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.

CVE-2021-42716 nothings vulnerability CVSS: 5.8 21 Oct 2021, 19:15 UTC

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

CVE-2021-42715 nothings vulnerability CVSS: 4.3 21 Oct 2021, 19:15 UTC

An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting crafted HDR files.

CVE-2020-6623 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_get_index.

CVE-2020-6622 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_peek8.

CVE-2020-6621 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has a heap-based buffer over-read in ttUSHORT.

CVE-2020-6620 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8.

CVE-2020-6619 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has an assertion failure in stbtt__buf_seek.

CVE-2020-6618 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__find_table.

CVE-2020-6617 nothings vulnerability CVSS: 6.8 08 Jan 2020, 23:15 UTC

stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_int.

CVE-2019-20056 nothings vulnerability CVSS: 4.3 29 Dec 2019, 19:15 UTC

stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned.

CVE-2019-19777 nothings vulnerability CVSS: 6.8 13 Dec 2019, 02:15 UTC

stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.

CVE-2018-16981 nothings vulnerability CVSS: 6.8 12 Sep 2018, 23:29 UTC

stb stb_image.h 2.19, as used in catimg, Emscripten, and other products, has a heap-based buffer overflow in the stbi__out_gif_code function.