Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
image processing project image processing vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-3464
TIFF library (libtiff) prior to 3.8.2 allows context-dependent malicious users to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving &...
Libtiff Libtiff
5
CVSSv2
CVE-2008-5012
Mozilla Firefox 2.x prior to 2.0.0.18, Thunderbird 2.x prior to 2.0.0.18, and SeaMonkey 1.x prior to 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote malicious users to bypass the same origin policy and access...
Mozilla Seamonkey 1.1.10
Mozilla Thunderbird 1.5.0.7
Mozilla Firefox 0.9 Rc
Mozilla Thunderbird 0.6
Mozilla Seamonkey 1.0.3
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Thunderbird 0.7.2
Mozilla Firefox 1.5
Mozilla Thunderbird 2.0.0.4
Mozilla Seamonkey 1.1.8
Mozilla Firefox 1.5.2
Mozilla Seamonkey 1.0.1
Mozilla Seamonkey 1.1.7
Mozilla Seamonkey 1.0.6
Mozilla Firefox 1.5.0.6
Mozilla Firefox 1.8
Mozilla Seamonkey 1.0.9
Mozilla Thunderbird 0.3
Mozilla Seamonkey 1.1.3
Mozilla Firefox 2.0.0.2
Mozilla Firefox 1.5.0.10
6.8
CVSSv2
CVE-2007-2949
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote malicious users to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
Gimp Gimp
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
5
CVSSv2
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.6.1
Wxgtk2 Wxgtk2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.1
Suse Suse Linux 9.0
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Apple Mac Os X Server 10.3.2
Apple Mac Os X 10.2.5
Trustix Secure Linux 2.0
Apple Mac Os X Server 10.2.2
Redhat Enterprise Linux Desktop 3.0
Apple Mac Os X 10.2.7
Apple Mac Os X 10.2.8
7.5
CVSSv2
CVE-2010-1205
Buffer overflow in pngpread.c in libpng prior to 1.2.44 and 1.4.x prior to 1.4.3, as used in progressive applications, might allow remote malicious users to execute arbitrary code via a PNG image that triggers an additional data row.
Libpng Libpng
Google Chrome
Apple Itunes
Apple Safari
Apple Iphone Os
Apple Mac Os X Server
Apple Mac Os X
Fedoraproject Fedora 13
Fedoraproject Fedora 12
Suse Linux Enterprise Server 10
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 9
Opensuse Opensuse 11.2
Vmware Player
Vmware Workstation
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 5.0
1 EDB exploit
6.4
CVSSv2
CVE-2011-4566
Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote malicious users to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF head...
Php Php 5.4.0
Php Php
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
7.5
CVSSv2
CVE-2005-2701
Heap-based buffer overflow in Firefox prior to 1.0.7 and Mozilla Suite prior to 1.7.12 allows remote malicious users to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.
Mozilla Firefox 1.0.2
Mozilla Firefox
Mozilla Mozilla Suite
Mozilla Mozilla Suite 1.7.10
Mozilla Firefox 1.0.4
Mozilla Mozilla Suite 1.7.8
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.3
Mozilla Mozilla Suite 1.7.7
Mozilla Mozilla Suite 1.7.6
Mozilla Firefox 1.0.5
7.5
CVSSv2
CVE-2005-2702
Firefox prior to 1.0.7 and Mozilla Suite prior to 1.7.12 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with "zero-width non-joiner" characters.
Mozilla Firefox 1.0.2
Mozilla Firefox
Mozilla Mozilla Suite
Mozilla Mozilla Suite 1.7.10
Mozilla Firefox 1.0.4
Mozilla Mozilla Suite 1.7.8
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.3
Mozilla Mozilla Suite 1.7.7
Mozilla Mozilla Suite 1.7.6
Mozilla Firefox 1.0.5
5
CVSSv2
CVE-2005-2703
Firefox prior to 1.0.7 and Mozilla Suite prior to 1.7.12 allows remote malicious users to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request s...
Mozilla Firefox 1.0.2
Mozilla Firefox
Mozilla Mozilla Suite
Mozilla Mozilla Suite 1.7.10
Mozilla Firefox 1.0.4
Mozilla Mozilla Suite 1.7.8
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.3
Mozilla Mozilla Suite 1.7.7
Mozilla Mozilla Suite 1.7.6
Mozilla Firefox 1.0.5
5
CVSSv2
CVE-2005-2704
Firefox prior to 1.0.7 and Mozilla Suite prior to 1.7.12 allows remote malicious users to spoof DOM objects via an XBL control that implements an internal XPCOM interface.
Mozilla Firefox 1.0.2
Mozilla Firefox
Mozilla Mozilla Suite
Mozilla Mozilla Suite 1.7.10
Mozilla Firefox 1.0.4
Mozilla Mozilla Suite 1.7.8
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.3
Mozilla Mozilla Suite 1.7.7
Mozilla Mozilla Suite 1.7.6
Mozilla Firefox 1.0.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »