Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
imageio vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-4632
ImageIO in Apple iOS prior to 9.3.3, OS X prior to 10.11.6, tvOS prior to 9.2.2, and watchOS prior to 2.2.2 allows remote malicious users to cause a denial of service (memory consumption) via unspecified vectors.
Apple Iphone Os
Apple Tvos
Apple Watchos
Apple Mac Os X
9.8
CVSSv3
CVE-2016-4629
ImageIO in Apple OS X prior to 10.11.6 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted xStride and yStride values in an EXR image.
Apple Mac Os X
NA
CVE-2014-1319
Buffer overflow in ImageIO in Apple OS X 10.9.x up to and including 10.9.2 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
Apple Mac Os X 10.9.2
Apple Mac Os X 10.9.1
Apple Mac Os X 10.9
6.5
CVSSv3
CVE-2016-1811
ImageIO in Apple iOS prior to 9.3.2, OS X prior to 10.11.5, tvOS prior to 9.2.1, and watchOS prior to 2.2.1 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted image.
Apple Watchos
Apple Tvos
Apple Iphone Os
Apple Mac Os X
NA
CVE-2015-5758
ImageIO in Apple iOS prior to 8.4.1 and OS X prior to 10.10.5 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image.
Apple Iphone Os
Apple Mac Os X
NA
CVE-2006-1982
Heap-based buffer overflow in the LZWDecodeVector function in Mac OS X prior to 10.4.6, as used in applications that use ImageIO or AppKit, allows remote malicious users to execute arbitrary code via crafted TIFF images.
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
Apple Mac Os X 10.4
Apple Mac Os X 10.4.1
Apple Mac Os X Server 10.3.8
Apple Mac Os X 10.3.3
Apple Mac Os X 10.3.5
Apple Mac Os X 10.3.7
Apple Mac Os X 10.4.2
Apple Mac Os X 10.4.4
Apple Mac Os X Server 10.3.5
Apple Mac Os X Server 10.3.7
Apple Mac Os X Server 10.4.2
Apple Mac Os X Server 10.4.4
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X Server 10.3
Apple Mac Os X Server 10.3.1
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.3.3
Apple Mac Os X Server 10.3.9
1 EDB exploit
NA
CVE-2013-1026
Buffer overflow in ImageIO in Apple Mac OS X prior to 10.8.5 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG2000 data in a PDF document.
Apple Mac Os X 10.8.0
Apple Mac Os X 10.8.3
Apple Mac Os X
Apple Mac Os X 10.8.1
Apple Mac Os X 10.8.2
Apple Iphone Os 1.0.0
Apple Iphone Os 1.0.1
Apple Iphone Os 1.1.5
Apple Iphone Os 2.0
Apple Iphone Os 3.0
Apple Iphone Os 3.0.1
Apple Iphone Os 4.0
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.2
Apple Iphone Os 6.0.1
Apple Iphone Os 6.0.2
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
NA
CVE-2015-5782
ImageIO in Apple iOS prior to 8.4.1 and OS X prior to 10.10.5 does not properly initialize an unspecified data structure, which allows remote malicious users to obtain sensitive information from process memory via a crafted TIFF image.
Apple Iphone Os
Apple Mac Os X
NA
CVE-2015-5781
ImageIO in Apple iOS prior to 8.4.1 and OS X prior to 10.10.5 does not properly initialize an unspecified data structure, which allows remote malicious users to obtain sensitive information from process memory via a crafted PNG image.
Apple Iphone Os
Apple Mac Os X
NA
CVE-2010-1753
ImageIO in Apple iOS prior to 4 on the iPhone and iPod touch allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG image.
Apple Iphone Os
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »