17 results (0.003 seconds)

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0

23 Dec 2021 — load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature. load_cache en GEGL antes de la versión 0.4.34 permite la expansión del shell cuando un nombre de ruta en una l... • https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adoc • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

24 Jun 2018 — GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private. GIMP hasta la versión 2.10.2 realiza llamadas g_get_tmp_dir para establecer nombres de archivo temporales, lo que podría resultar en un nombre de archivo que ya existe, tal y como queda de... • https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

01 Jul 2016 — Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file. Vulnerabilidad de uso después de liberación de memoria en la función xcf_load_image en app/xcf/xcf-load.c en GIMP permite a atacantes remotos provocar una denegación de servicio (caída de programa) o posiblemente ejecutar código arbitrario a través de un archivo XCF manipulado. Multiple use-af... • http://lists.opensuse.org/opensuse-updates/2016-07/msg00005.html • CWE-416: Use After Free •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 1

18 Dec 2012 — Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file. Múltiples desbordamientos de bufer basados en pila en file-xwd.c en el complemento X Window Dump (XWD) en GIMP v2.8.2 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de ... • http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

31 Aug 2012 — The scriptfu network server in GIMP 2.6 does not require authentication, which allows remote attackers to execute arbitrary commands via the python-fu-eval command. El servidor de red ScriptFu en GIMP v2.6 no requiere autenticación, permite a atacantes remotos ejecutar comandos arbitrarios a través del comando python-fu-eval. GIMP is vulnerable to multiple buffer overflows which could result in the execution of arbitrary code or Denial of Service. Versions less than 2.8.0 are affected. • http://archives.neohapsis.com/archives/bugtraq/2012-08/0106.html • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 4%CPEs: 1EXPL: 0

25 Aug 2012 — Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted KiSS palette file, which triggers an "invalid free." Desbordamiento de búfer basado en memoria dinámica en el complemento de formato de archivo KiSS CEL en GIMP v2.8.x y anteriores, permite a atacantes remotos provocar una denegación de servicio y posiblemente ejcutar código de su elección a través de un archivo de pal... • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00020.html • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 0

25 Aug 2012 — Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. Desbordamiento de entero en la función ReadImage en plug-ins/common/file-gif-load.c en el co... • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00023.html • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 9%CPEs: 1EXPL: 5

12 Jul 2012 — fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. fits-io.c en GIMP antes de v2.8.1 permite a atacantes remotos causar una denegación de servicio (desreferencia de puntero nulo y caída de la aplicación) a través de una cabecera XTENSION incorrecta de un archivo .fit, tal y como se demuestra mediante una cadena demasiado larga. • https://www.exploit-db.com/exploits/19482 • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 87%CPEs: 1EXPL: 3

12 Jul 2012 — Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server. Desbordamiento de búfer basado en pila en la función readstr_upto en plug-ins/script-fu/tinyscheme/scheme.c en GIMP v2.6.12 y anteriores y posiblemente v2.6.13, permite a atacantes remotos ejecutar código de su elección a través de una cadena larga en un comando para el... • https://www.exploit-db.com/exploits/18956 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 5%CPEs: 3EXPL: 0

19 Aug 2011 — The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to ... • http://cups.org/str.php?L3867 • CWE-787: Out-of-bounds Write •