Search for packages
| purl | pkg:nuget/libpng@1.6.19.1 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-8g2j-rqsk-zqfh
Aliases: CVE-2017-12652 |
Improper Input Validation libpng does not properly check the length of chunks against the user limit. | There are no reported fixed by versions. |
|
VCID-zetn-zwnv-u7gf
Aliases: CVE-2016-10087 |
NULL Pointer Dereference The png_set_text_2 function in libpng allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1h1a-mpgm-w3hf | Privilege Escalation Unspecified vulnerability in libpng, as used in Android , allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug |
CVE-2016-3751
|
| VCID-cu24-1rcd-93g3 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. |
CVE-2015-8126
|