Page 2 of 14 results (0.007 seconds)

CVSS: 9.8EPSS: 2%CPEs: 25EXPL: 1

18 Oct 2005 — pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack. • http://secunia.com/advisories/17221 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

05 Aug 2005 — pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands. pstopnm en netpbm no usa adecuadamente la opción "-dSAFER" (cuando llama a Ghostscript para convertir un archivo PostScript en un pbm, pgm o pnm), lo que permite que atacantes remotos con la intervención del usuario puedan ejecutar comandos arbitrarios. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

17 Feb 2004 — netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files. netpbm 2:9.25 y anteriores no crea adecuadamente ficheros temporales, lo que permite a usuarios locales sobreescribir ficheros arbitrarios. • ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc •

CVSS: 9.8EPSS: 8%CPEs: 1EXPL: 0

18 Mar 2003 — Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via "maths overflow errors" such as (1) integer signedness errors or (2) integer overflows, which lead to buffer overflows. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000656 •