Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enlightenment imlib2 1.1.2 vulnerabilities and exploits
(subscribe to this query)
2.6
CVSSv2
CVE-2006-4808
Heap-based buffer overflow in loader_tga.c in imlib2 prior to 1.2.1, and possibly other versions, allows user-assisted remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TGA image.
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.0.1
Enlightenment Imlib2 1.1.2
Enlightenment Imlib2 1.1
Enlightenment Imlib2 1.1.1
2.6
CVSSv2
CVE-2006-4807
loader_tga.c in imlib2 prior to 1.2.1, and possibly other versions, allows user-assisted remote malicious users to cause a denial of service (crash) via a crafted TGA image that triggers an out-of-bounds memory read, a different issue than CVE-2006-4808.
Enlightenment Imlib2 1.0.5
Enlightenment Imlib2 1.1
Enlightenment Imlib2 1.0.3
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.1
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.1.1
Enlightenment Imlib2 1.1.2
5.1
CVSSv2
CVE-2006-4809
Stack-based buffer overflow in loader_pnm.c in imlib2 prior to 1.2.1, and possibly other versions, allows user-assisted remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM image.
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.0.1
Enlightenment Imlib2 1.1.2
Enlightenment Imlib2 1.1
Enlightenment Imlib2 1.1.1
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
10
CVSSv2
CVE-2008-6079
imlib2 prior to 1.4.2 allows context-dependent malicious users to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to "several heap and stack based buffer overflows - partly due to integer overflows.&qu...
Enlightenment Imlib2
Enlightenment Imlib2 1.1
Enlightenment Imlib2 1.0.5
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.2.2
Enlightenment Imlib2 1.2.1
Enlightenment Imlib2 1.0.1
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.4.0
Enlightenment Imlib2 1.3.0
Enlightenment Imlib2 1.0.3
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.1.2
Enlightenment Imlib2 1.1.1
5.1
CVSSv2
CVE-2006-4806
Multiple integer overflows in imlib2 allow user-assisted remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) ARGB (loader_argb.c), (2) PNG (loader_png.c), (3) LBM (loader_lbm.c), (4) JPEG (loader_jpeg.c), or (5) TIFF (...
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Enlightenment Imlib2 1.2.2
Enlightenment Imlib2 1.3
Enlightenment Imlib2 1.0
Enlightenment Imlib2 1.0.1
Enlightenment Imlib2 1.1.2
Enlightenment Imlib2 1.2.1
Enlightenment Imlib2 1.1
Enlightenment Imlib2 1.1.1
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
5.1
CVSSv2
CVE-2004-0802
Buffer overflow in the BMP loader in imlib2 prior to 1.1.2 allows remote malicious users to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Enlightenment Imlib 1.9.10
Enlightenment Imlib 1.9.11
Enlightenment Imlib 1.9.6
Enlightenment Imlib 1.9.7
Enlightenment Imlib2 1.0.4
Enlightenment Imlib2 1.0.5
Imagemagick Imagemagick 5.4.8
Imagemagick Imagemagick 5.4.8.2.1.1.0
Imagemagick Imagemagick 5.5.3.2.1.2.0
Conectiva Linux 9.0
Enlightenment Imlib 1.9
Enlightenment Imlib 1.9.1
Enlightenment Imlib 1.9.4
Enlightenment Imlib 1.9.5
Enlightenment Imlib2 1.0.2
Enlightenment Imlib2 1.0.3
Imagemagick Imagemagick 5.4.4.5
Imagemagick Imagemagick 5.4.7
Sun Java Desktop System 2003
Conectiva Linux 10.0
Enlightenment Imlib 1.9.2
Enlightenment Imlib 1.9.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started