Multiple integer overflows in libpng 1.2.5 allow remote attackers to crash the application via images.
Reporter | Title | Published | Views | Family All 78 |
---|---|---|---|---|
![]() | libpng3 - buffer overflows, integer overflow | 20 Oct 200400:00 | – | osv |
![]() | libpng - integer overflow | 20 Oct 200400:00 | – | osv |
![]() | RHSA-2004:402 Red Hat Security Advisory: libpng security update | 5 Nov 202416:23 | – | osv |
![]() | libpng - several vulnerabilities | 4 Aug 200400:00 | – | osv |
![]() | Debian Security Advisory DSA 571-1 (libpng3) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-571-1) | 17 Jan 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 570-1 (libpng) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-570-1) | 17 Jan 200800:00 | – | openvas |
![]() | Slackware Advisory SSA:2004-222-01 libpng | 11 Sep 201200:00 | – | openvas |
![]() | FreeBSD Ports: png | 4 Sep 200800:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo