-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerable functions were identified based on the vulnerability description, which explicitly names 'opj_t1_decode_cblks', and the stack trace provided in the linked GitHub issue. The stack trace shows the execution path leading to the vulnerability, allowing for the identification of other relevant functions that would appear in a runtime profile during exploitation. The file paths are inferred from the stack trace. Confidence is high for the explicitly named function and medium for the others in the call stack as they are part of the exploitation path but not the direct source of the vulnerability.