Total
102 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-39556 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D1() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39561 | 1 Swftools | 1 Swftools | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution. | |||||
CVE-2021-39597 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_dump2() located in code.c. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39588 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_ReadABC() located in abc.c. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39585 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39569 | 1 Swftools | 1 Swftools | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function OpAdvance() located in swfaction.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39592 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function pool_lookup_uint() located in pool.c. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39563 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39579 | 1 Swftools | 1 Swftools | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function string_hash() located in q.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39559 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function GString::~GString() located in GString.cc. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39574 | 1 Swftools | 1 Swftools | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function pool_read() located in pool.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39591 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_GetShapeBoundingBox() located in swfshape.c. It allows an attacker to cause Denial of Service. | |||||
CVE-2021-39557 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function copyString() located in gmem.cc. It allows an attacker to cause Denial of Service. | |||||
CVE-2017-16890 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
SWFTools 0.9.2 has a divide-by-zero error in the wav_convert2mono function in lib/wav.c because the align value may be zero. | |||||
CVE-2017-8420 | 2 Microsoft, Swftools | 2 Windows, Swftools | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
SWFTools 2013-04-09-1007 on Windows has a "Data from Faulting Address controls Branch Selection starting at image00000000_00400000+0x0000000000003e71" issue. This issue can be triggered by a malformed TTF file that is mishandled by font2swf. Attackers could exploit this issue for DoS (Access Violation). | |||||
CVE-2017-16797 | 1 Swftools | 1 Swftools | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
In SWFTools 0.9.2, the png_load function in lib/png.c does not properly validate an alloclen_64 multiplication of width and height values, which allows remote attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and application crash) or possibly have unspecified other impact via a crafted PNG file. | |||||
CVE-2017-11096 | 1 Swftools | 1 Swftools | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
When SWFTools 0.9.2 processes a crafted file in swfcombine, it can lead to a NULL Pointer Dereference in the swf_DeleteFilter() function in lib/modules/swffilter.c. | |||||
CVE-2017-9925 | 2 Microsoft, Swftools | 2 Windows, Swftools | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
In SWFTools 2013-04-09-1007 on Windows, png2swf allows remote attackers to execute arbitrary code or cause a denial of service via a crafted file, related to a "User Mode Write AV near NULL starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | |||||
CVE-2017-16794 | 1 Swftools | 1 Swftools | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
The png_load function in lib/png.c in SWFTools 0.9.2 does not properly validate a multiplication of width and bits-per-pixel values, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an erroneous png_load call that occurs because of incorrect integer data types in png2swf. | |||||
CVE-2017-9927 | 2 Microsoft, Swftools | 2 Windows, Swftools | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
In SWFTools 2013-04-09-1007 on Windows, png2swf allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted file, related to a "Read Access Violation starting at image00000000_00400000+0x000000000001b5fe." |