Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:nuget/libpng@1.2.0
purl pkg:nuget/libpng@1.2.0
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 1.5
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-9dg2-qygx-vbah
Aliases:
CVE-2011-2691
NULL Pointer Dereference The png_err function in pngerror.c in libpng makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
1.6.18.1
Affected by 4 other vulnerabilities.
VCID-axvf-w4r8-xkhv
Aliases:
CVE-2011-3048
Improper Restriction of Operations within the Bounds of a Memory Buffer The png_set_text_2 function in pngset.c in libpng allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
1.6.18.1
Affected by 4 other vulnerabilities.
VCID-d5tt-4fbc-m7ar
Aliases:
CVE-2010-0205
Uncontrolled Resource Consumption The png_decompress_chunk function in pngrutil.c in libpng does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
1.5.10.9
Affected by 8 other vulnerabilities.
VCID-hfvd-x3vm-fyfz
Aliases:
CVE-2012-3425
Improper Restriction of Operations within the Bounds of a Memory Buffer The png_push_read_zTXt function in pngpread.c in libpng allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
1.6.18.1
Affected by 4 other vulnerabilities.
VCID-kf5b-ush9-mkd1
Aliases:
CVE-2011-2501
Out-of-bounds Read The png_format_buffer function in pngerror.c in libpng allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
1.5.10.9
Affected by 8 other vulnerabilities.
VCID-qpn2-bwsx-1kcg
Aliases:
CVE-2011-2690
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Buffer overflow in libpng , when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
1.6.18.1
Affected by 4 other vulnerabilities.
VCID-uddn-ka9m-wycz
Aliases:
CVE-2011-2692
Improper Restriction of Operations within the Bounds of a Memory Buffer The png_handle_sCAL function in pngrutil.c in libpng does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
1.6.18.1
Affected by 4 other vulnerabilities.
VCID-zetn-zwnv-u7gf
Aliases:
CVE-2016-10087
NULL Pointer Dereference The png_set_text_2 function in libpng allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
1.6.26.1
Affected by 1 other vulnerability.
1.6.28.1
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:47:10.623201+00:00 GitLab Importer Affected by VCID-zetn-zwnv-u7gf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2016-10087.yml 38.0.0
2026-04-01T12:46:47.178346+00:00 GitLab Importer Affected by VCID-hfvd-x3vm-fyfz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2012-3425.yml 38.0.0
2026-04-01T12:46:46.882725+00:00 GitLab Importer Affected by VCID-axvf-w4r8-xkhv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2011-3048.yml 38.0.0
2026-04-01T12:46:46.341023+00:00 GitLab Importer Affected by VCID-qpn2-bwsx-1kcg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2011-2690.yml 38.0.0
2026-04-01T12:46:46.318702+00:00 GitLab Importer Affected by VCID-kf5b-ush9-mkd1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2011-2501.yml 38.0.0
2026-04-01T12:46:46.297345+00:00 GitLab Importer Affected by VCID-9dg2-qygx-vbah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2011-2691.yml 38.0.0
2026-04-01T12:46:46.275742+00:00 GitLab Importer Affected by VCID-uddn-ka9m-wycz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2011-2692.yml 38.0.0
2026-04-01T12:46:45.825637+00:00 GitLab Importer Affected by VCID-d5tt-4fbc-m7ar https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2010-0205.yml 38.0.0