{"id":"CVE-2021-45908","details":"An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted.","modified":"2026-03-14T11:17:24.764254Z","published":"2021-12-28T01:15:07.480Z","references":[{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-45908.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.9"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}