Improper input validation in the BitstreamWriter::write_bits() function of Tempus Ex hello-video-codec v0.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
History

Tue, 02 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Tempus-ex
Tempus-ex hello-video-codec
Vendors & Products Tempus-ex
Tempus-ex hello-video-codec

Mon, 01 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in the BitstreamWriter::write_bits() function of Tempus Ex hello-video-codec v0.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-01T00:00:00.000Z

Updated: 2025-12-01T19:51:00.894Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63095

cve-icon Vulnrichment

Updated: 2025-12-01T19:44:42.211Z

cve-icon NVD

Status : Received

Published: 2025-12-01T16:15:55.657

Modified: 2025-12-01T20:15:52.757

Link: CVE-2025-63095

cve-icon Redhat

No data.