Vulnerability Description
Improper input validation in the BitstreamWriter::write_bits() function of Tempus Ex hello-video-codec v0.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tempus-Ex | Hello-Video-Codec | 0.1.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/thesmartshadow/b092e2493821491b981a069847a33064ExploitPatchThird Party Advisory
- https://github.com/tempus-ex/hello-video-codecProduct
- https://github.com/tempus-ex/hello-video-codec/blob/3e9551c699311ea12ad7f2fce956Product
- https://github.com/tempus-ex/hello-video-codec/tree/3e9551c699311ea12ad7f2fce956Product
FAQ
What is CVE-2025-63095?
CVE-2025-63095 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Improper input validation in the BitstreamWriter::write_bits() function of Tempus Ex hello-video-codec v0.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
How severe is CVE-2025-63095?
CVE-2025-63095 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-63095?
Check the references section above for vendor advisories and patch information. Affected products include: Tempus-Ex Hello-Video-Codec.