Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irfanview irfanview vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-13880
IrfanView B3D PlugIns before version 4.56 has a B3d.dll!+1cbf heap-based out-of-bounds write.
Irfanview B3d
9.8
CVSSv3
CVE-2020-13879
IrfanView B3D PlugIns before version 4.56 has a B3d.dll!+214f heap-based out-of-bounds write.
Irfanview B3d
9.8
CVSSv3
CVE-2020-13878
IrfanView B3D PlugIns before version 4.56 has a B3d.dll!+27ef heap-based out-of-bounds write.
Irfanview B3d
9.8
CVSSv3
CVE-2021-27362
The WPG plugin prior to 3.1.0.0 for IrfanView 4.57 has a Read Access Violation on Control Flow starting at WPG!ReadWPG_W+0x0000000000000133, which might allow remote malicious users to execute arbitrary code.
Irfanview Wpg
9.6
CVSSv3
CVE-2013-3486
IrfanView FlashPix Plugin 4.3.4 0 has an Integer Overflow Vulnerability
Irfanview Flashpix Plugin 4.3.4.0
8.8
CVSSv3
CVE-2020-13905
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000038ed4.
Irfanview Irfanview 4.54
7.8
CVSSv3
CVE-2023-24304
Improper input validation in the PDF.dll plugin of IrfanView v4.60 allows malicious users to execute arbitrary code via opening a crafted PDF file.
Irfanview Irfanview 4.60
7.8
CVSSv3
CVE-2020-23551
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e30.
Irfanview Irfanview 4.54
7.8
CVSSv3
CVE-2020-23550
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e82.
Irfanview Irfanview 4.54
7.8
CVSSv3
CVE-2020-23552
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e62.
Irfanview Irfanview 4.54
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »