Search for packages
purl | pkg:nuget/libpng@1.6.19.1 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4wrn-uqht-aaan
Aliases: CVE-2017-12652 |
Improper Input Validation libpng does not properly check the length of chunks against the user limit. | There are no reported fixed by versions. |
VCID-7ep2-beej-aaaf
Aliases: CVE-2016-10087 |
NULL Pointer Dereference The png_set_text_2 function in libpng allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. |
Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. |
VCID-pkbe-c1vr-aaaf
Aliases: CVE-2018-14550 GHSA-qwwr-qc2p-6283 |
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-2vwq-s4y4-aaae | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. |
CVE-2015-8126
|
VCID-n3zc-yzy3-aaaq | Privilege Escalation Unspecified vulnerability in libpng, as used in Android , allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug |
CVE-2016-3751
|