Struktur Struktur

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Struktur product.

RSS Feeds for Struktur security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Struktur products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Struktur Sorted by Most Security Vulnerabilities since 2018

Struktur Libde26555 vulnerabilities

Struktur Libheif15 vulnerabilities

By the Year

In 2026 there have been 0 vulnerabilities in Struktur. Last year, in 2025 Struktur had 3 security vulnerabilities published. Right now, Struktur is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 3 7.50
2024 4 8.10
2023 24 7.35
2022 22 6.57
2021 16 6.78
2020 0 0.00
2019 1 8.80

It may take a day or so for new Struktur vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Struktur Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-43967 Apr 21, 2025
NULL deref in libheif <1.19.6 grid image handler libheif before 1.19.6 has a NULL pointer dereference in ImageItem_Grid::get_decoder in image-items/grid.cc because a grid image can reference a nonexistent image item.
Libheif
CVE-2025-43966 Apr 21, 2025
NULL Pointer Deref in libheif <1.19.6 (ImageItem_iden) libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden in image-items/iden.cc.
Libheif
CVE-2025-29482 Apr 07, 2025
libheif 1.19.7 SAO Buffer Overflow via libde265 Buffer Overflow vulnerability in libheif 1.19.7 allows a local attacker to execute arbitrary code via the SAO (Sample Adaptive Offset) processing of libde265.
Libheif
CVE-2024-41311 Oct 15, 2024
libheif 1.17.6 ImageOverlay::parse OOB Read/Write In Libheif 1.17.6, insufficient checks in ImageOverlay::parse() decoding a heif file containing an overlay image with forged offsets can lead to an out-of-bounds read and write.
Libheif
CVE-2024-38949 Jun 26, 2024
Heap Buffer Overflow in libde265 v1.0.15 (display444as420) Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to display444as420 function at sdl.cc
Libde265
CVE-2024-38950 Jun 26, 2024
Heap Buffer Overflow in Libde265 1.0.15 __interceptor_memcpy Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to __interceptor_memcpy function.
Libde265
CVE-2024-25269 Mar 05, 2024
Denial of Service via JpegEncoder::Encode Memory Leak in libheif <=1.17.6 libheif <= 1.17.6 contains a memory leak in the function JpegEncoder::Encode. This flaw allows an attacker to cause a denial of service attack.
Libheif
CVE-2023-49467 Dec 07, 2023
Libde265 v1.0.14 Heap-Buffer-Overflow in derive_combined_bipredictive_merging_candidates Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc.
Libde265
CVE-2023-49464 Dec 07, 2023
libheif v1.17.5 UncompressedImageCodec segfault vulnerability libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci.
Libheif
CVE-2023-49468 Dec 07, 2023
Buffer Overflow in Libde265 v1.0.14 read_coding_unit slice.cc Libde265 v1.0.14 was discovered to contain a global buffer overflow vulnerability in the read_coding_unit function at slice.cc.
Libde265
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.