Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libjpeg-turbo libjpeg-turbo vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-35538
A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
Libjpeg-turbo Libjpeg-turbo 2.0.5
5.5
CVSSv3
CVE-2021-46822
The PPM reader in libjpeg-turbo up to and including 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row f...
Libjpeg-turbo Libjpeg-turbo
5.5
CVSSv3
CVE-2019-13960
In libjpeg-turbo 2.0.2, a large amount of memory can be used during processing of an invalid progressive JPEG image containing incorrect width and height values in the image header. NOTE: the vendor's expectation, for use cases in which this memory usage would be a denial of...
Libjpeg-turbo Libjpeg-turbo 2.0.2
NA
CVE-2021-0384
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
NA
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo up to and including 1.3.0, as used in Google Chrome prior to 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that fol...
Google Chrome
Oracle Solaris 11.3
Artifex Gpl Ghostscript
Libjpeg-turbo Libjpeg-turbo
Fedoraproject Fedora 18
Fedoraproject Fedora 20
Fedoraproject Fedora 19
Opensuse Opensuse 12.3
Opensuse Opensuse 12.2
Opensuse Opensuse 13.1
Canonical Ubuntu Linux 13.04
Canonical Ubuntu Linux 13.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird
Mozilla Firefox Esr
NA
CVE-2013-6630
The get_dht function in jdmarker.c in libjpeg-turbo up to and including 1.3.0, as used in Google Chrome prior to 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG ...
Google Chrome 31.0.1650.22
Google Chrome 31.0.1650.45
Google Chrome 31.0.1650.11
Google Chrome 31.0.1650.33
Google Chrome 31.0.1650.32
Google Chrome 31.0.1650.31
Google Chrome 31.0.1650.28
Google Chrome 31.0.1650.26
Google Chrome 31.0.1650.4
Google Chrome 31.0.1650.2
Google Chrome 31.0.1650.16
Google Chrome 31.0.1650.39
Google Chrome 31.0.1650.41
Google Chrome 31.0.1650.38
Google Chrome 31.0.1650.5
Google Chrome
Google Chrome 31.0.1650.36
Google Chrome 31.0.1650.43
Google Chrome 31.0.1650.34
Google Chrome 31.0.1650.13
Google Chrome 31.0.1650.44
Google Chrome 31.0.1650.23
NA
CVE-2013-6631
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome prior to 31.0.1650.48 and other products, allows remote malicious users to cause a denial of service (heap memory corruption) or possib...
Google Chrome 31.0.1650.41
Google Chrome 31.0.1650.39
Google Chrome 31.0.1650.32
Google Chrome 31.0.1650.31
Google Chrome 31.0.1650.23
Google Chrome 31.0.1650.22
Google Chrome 31.0.1650.13
Google Chrome 31.0.1650.43
Google Chrome 31.0.1650.42
Google Chrome 31.0.1650.34
Google Chrome 31.0.1650.33
Google Chrome 31.0.1650.26
Google Chrome 31.0.1650.25
Google Chrome 31.0.1650.15
Google Chrome 31.0.1650.14
Google Chrome 31.0.1650.7
Google Chrome 31.0.1650.6
Google Chrome 31.0.1650.46
Google Chrome 31.0.1650.45
Google Chrome 31.0.1650.44
Google Chrome 31.0.1650.36
Google Chrome 31.0.1650.35
NA
CVE-2013-6632
Integer overflow in Google Chrome prior to 31.0.1650.57 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.
Google Chrome
Debian Debian Linux 8.0
Debian Debian Linux 7.0
2 Github repositories
NA
CVE-2013-6621
Use-after-free vulnerability in Google Chrome prior to 31.0.1650.48 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Opensuse Opensuse 13.1
Google Chrome 31.0.1650.41
Google Chrome 31.0.1650.39
Google Chrome 31.0.1650.31
Google Chrome 31.0.1650.30
Google Chrome 31.0.1650.22
Google Chrome 31.0.1650.20
Google Chrome 31.0.1650.13
Google Chrome 31.0.1650.12
Google Chrome 31.0.1650.11
Google Chrome 31.0.1650.4
Google Chrome 31.0.1650.3
Google Chrome 31.0.1650.45
Google Chrome 31.0.1650.44
Google Chrome 31.0.1650.35
Google Chrome 31.0.1650.34
Google Chrome 31.0.1650.27
Google Chrome 31.0.1650.26
Google Chrome 31.0.1650.17
Google Chrome 31.0.1650.16
NA
CVE-2013-6622
Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome prior to 31.0.1650.48, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via...
Google Chrome 31.0.1650.43
Google Chrome 31.0.1650.42
Google Chrome 31.0.1650.34
Google Chrome 31.0.1650.33
Google Chrome 31.0.1650.26
Google Chrome 31.0.1650.25
Google Chrome 31.0.1650.15
Google Chrome 31.0.1650.14
Google Chrome 31.0.1650.7
Google Chrome 31.0.1650.6
Google Chrome 31.0.1650.41
Google Chrome 31.0.1650.39
Google Chrome 31.0.1650.32
Google Chrome 31.0.1650.31
Google Chrome 31.0.1650.23
Google Chrome 31.0.1650.22
Google Chrome 31.0.1650.13
Google Chrome 31.0.1650.12
Google Chrome 31.0.1650.5
Google Chrome 31.0.1650.4
Google Chrome 31.0.1650.46
Google Chrome 31.0.1650.45
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »