Published: 01/07/2022 Updated: 23/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

JPEGOPTIM v1.4.7 exists to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jpegoptim project jpegoptim 1.4.7

fedoraproject fedora 37

Github Repositories

CVE-2022-32325 JPEGOPTIM v147 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptimc authentication complexity vector NONE MEDIUM NETWORK confidentiality integrity availability NONE NONE PARTIAL CVSS Score: 43 References tjko/jpegoptim#107 listsfedoraprojectorg/archives/list/package-announc

CVE-2022-32324 ref kermitt2/pdfalto#144 nvdnistgov/vuln/detail/CVE-2022-32324 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/bupt//tools/llvm-1201/llvm/projects/compiler-rt/lib/asan/asan_interceptorscpp:397 in strncat CVE-2022-32325 ref tjko/jpegoptim#107 nvdnistgov/vuln/detail/CVE-2022-32325 SUMMARY: AddressSanitizer: SEGV (/usr/lib/x86_64-li

Kubernetes-admin-toolkit (kat) Overview container with various tools to assist in a kubernetes cluster administration/troubleshooting GMT timezone and GB locale additional tools pre-installed Deployment Docker # run single command d run -it --rm \ --name kubernetes-admin-toolkit-throwaway \ adegoodyer/kubernetes-admin-toolkit:latest \ curl -L --head googlecouk # disposable