Filtered by vendor Xnview
Subscribe
Total
167 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2012-0282 | 1 Xnview | 1 Xnview | 2024-02-04 | 6.8 MEDIUM | N/A |
Heap-based buffer overflow in XnView before 1.99 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ImageLeftPosition value in an ImageDescriptor structure in a GIF image. | |||||
CVE-2013-2577 | 1 Xnview | 1 Xnview | 2024-02-04 | 9.3 HIGH | N/A |
Buffer overflow in XnView before 2.04 allows remote attackers to execute arbitrary code via a crafted PCT file. | |||||
CVE-2011-1338 | 1 Xnview | 1 Xnview | 2024-02-04 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in XnView before 1.98.1 allows local users to gain privileges via a Trojan horse .exe file in a folder selected by the "Open containing folder" menu item. | |||||
CVE-2012-1051 | 1 Xnview | 1 Xnview | 2024-02-04 | 6.8 MEDIUM | N/A |
Heap-based buffer overflow in Xjp2.dll in the JPEG2000 plug-in in XnView 1.98.5 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment. | |||||
CVE-2010-1932 | 1 Xnview | 1 Xnview | 2024-02-04 | 9.3 HIGH | N/A |
Heap-based buffer overflow in XnView 1.97.4 and possibly earlier allows remote attackers to execute arbitrary code via a MultiBitMap (MBM) file with a Paint Data Section that contains a malformed Encoding field. | |||||
CVE-2009-4001 | 1 Xnview | 1 Xnview | 2024-02-04 | 9.3 HIGH | N/A |
Integer overflow in XnView before 1.97.2 might allow remote attackers to execute arbitrary code via a DICOM image with crafted dimensions, leading to a heap-based buffer overflow. | |||||
CVE-2008-1461 | 1 Xnview | 1 Xnview | 2024-02-04 | 7.6 HIGH | N/A |
Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line. NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker. |