Max CVSS 6.8 Min CVSS 1.9 Total Count2
IDCVSSSummaryLast (major) updatePublished
CVE-2020-12767 2.1
exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.
27-01-2023 - 18:43 09-05-2020 - 21:15
CVE-2020-0198 5.0
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product
14-10-2022 - 02:43 11-06-2020 - 15:15
CVE-2020-0181 5.0
In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploita
14-10-2022 - 02:41 11-06-2020 - 15:15
CVE-2020-0093 1.9
In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploita
14-10-2022 - 02:40 14-05-2020 - 21:15
CVE-2019-9278 6.8
In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitatio
14-10-2022 - 01:47 27-09-2019 - 19:15
CVE-2020-13114 5.0
An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.
27-04-2022 - 14:45 21-05-2020 - 16:15
CVE-2020-13113 6.4
An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.
26-04-2022 - 20:50 21-05-2020 - 17:15
CVE-2020-0182 6.4
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploita
06-07-2020 - 16:01 11-06-2020 - 15:15
Back to Top Mark selected
Back to Top