Known Vulnerabilities for products from Irfanview

Listed below are 20 of the newest known vulnerabilities associated with the vendor "Irfanview".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-29367 A buffer overflow vulnerability in WPG+0x1dda of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted WPG ... 7.8 - HIGH 2021-09-28 2021-09-28
CVE-2021-29366 A buffer overflow vulnerability in FORMATS!GetPlugInInfo+0x2de9 of Irfanview 4.57 allows attackers to execute arbitrary code ... 7.8 - HIGH 2021-09-28 2021-09-28
CVE-2021-29365 Irfanview 4.57 is affected by an infinite loop when processing a crafted BMP file in the EFFECTS!AutoCrop_W component. This c... 5.5 - MEDIUM 2021-09-28 2021-10-06
CVE-2021-29364 A buffer overflow vulnerability in Formats!ReadRAS_W+0x1001 of Irfanview 4.57 allows attackers to execute arbitrary code via ... 7.8 - HIGH 2021-09-28 2021-10-06
CVE-2021-29363 A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a... 7.8 - HIGH 2021-09-28 2021-10-05
CVE-2021-29362 A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa30 of Irfanview 4.57 allows attackers to execute arbitrary code via a... 7.8 - HIGH 2021-09-28 2021-09-28
CVE-2021-29361 A buffer overflow vulnerability in FORMATS!Read_Utah_RLE+0x340 of Irfanview 4.57 allows attackers to execute arbitrary code v... 7.8 - HIGH 2021-09-28 2021-10-05
CVE-2021-29360 A buffer overflow vulnerability in FORMATS!Read_Utah_RLE+0x37a of Irfanview 4.57 allows attackers to execute arbitrary code v... 7.8 - HIGH 2021-09-28 2021-10-05
CVE-2021-29358 A buffer overflow vulnerability in FORMATS!ReadPVR_W+0xfa of Irfanview 4.57 allows attackers to cause a denial of service (DO... 5.5 - MEDIUM 2021-09-28 2021-09-28
CVE-2021-27362 The WPG plugin before 3.1.0.0 for IrfanView 4.57 has a Read Access Violation on Control Flow starting at WPG!ReadWPG_W+0x0000... 9.8 - CRITICAL 2021-02-17 2021-02-22
CVE-2021-27224 The WPG plugin before 3.1.0.0 for IrfanView 4.57 has a user-mode write access violation starting at WPG+0x0000000000012ec6, w... 7.5 - HIGH 2021-02-17 2021-02-22
CVE-2020-35133 irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb... 7.5 - HIGH 2020-12-16 2020-12-18
CVE-2020-23567 Irfanview v4.53 allows attackers to to cause a denial of service (DoS) via a crafted JPEG 2000 file. Related to "Integer Divi... 5.5 - MEDIUM 2021-11-05 2021-11-08
CVE-2020-23566 Irfanview v4.53 was discovered to contain an infinity loop via JPEG2000!ShowPlugInSaveOptions_W+0x1ecd8. 5.5 - MEDIUM 2021-11-05 2021-11-08
CVE-2020-23565 Irfanview v4.53 allows attackers to execute arbitrary code via a crafted JPEG 2000 file. Related to a "Data from Faulting Add... 7.8 - HIGH 2021-11-05 2021-11-08
CVE-2020-23549 IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted .cr2 file, r... 7.8 - HIGH 2021-10-28 2021-11-02
CVE-2020-23546 IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted XBM file, re... 7.8 - HIGH 2021-10-28 2021-11-02
CVE-2020-13906 IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000038eb7. 7.8 - HIGH 2020-06-10 2020-06-17
CVE-2020-13905 IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000038ed4. 8.8 - HIGH 2020-06-10 2020-06-17
CVE-2019-17258 IrfanView 4.53 allows Data from a Faulting Address to control a subsequent Write Address starting at JPEG_LS+0x00000000000083... 7.8 - HIGH 2019-10-08 2019-10-10

Known software with vulnerabilities from Irfanview

Type Vendor Product Version
ApplicationIrfanviewBabacad4image1.3
ApplicationIrfanviewCadimage12.0.0.5
ApplicationIrfanviewFlashpix Plugin4.3.4.0
ApplicationIrfanviewFpx1.70
ApplicationIrfanviewIrfanview-
ApplicationIrfanviewIrfanview Plugins4.33
ApplicationIrfanviewPdf4.43
ApplicationIrfanviewTools4.50
ApplicationIrfanviewWpg Plugin-

Popular searches for "Irfanview"

Siri Knowledge

IrfanView is an image viewer, editor, organiser and converter program for Microsoft Windows. It can also play video and audio files, and has some image creation and painting capabilities. IrfanView is free for non-commercial use; commercial use requires paid registration. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic file formats. It was first released in 1996.

IrfanView - Official Homepage - One of the Most Popular Viewers Worldwide

www.irfanview.com

M IIrfanView - Official Homepage - One of the Most Popular Viewers Worldwide IrfanView 3 1 / ... one of the most popular viewers worldwide.

www.irfanview.com/index.htm a.st-hatena.com/go?http%3A%2F%2Fwww.irfanview.com%2F20210113235816= www.startpage.co.il/go/redir.asp?link=843 os-ludbreg.skole.hr/redir_links2.php?l_id=35&url=http%3A%2F%2Fwww.irfanview.com%2F www.eos-numerique.com/redirect-to/?redirect=http%3A%2F%2Fwww.irfanview.com%2F a.st-hatena.com/go?http%3A%2F%2Fwww.irfanview.com%2F20200121190304= forums.tombihn.com/redirect-to/?redirect=https%3A%2F%2Fwww.irfanview.com IrfanView 64-bit computing Microsoft Windows Freeware Download User experience 32-bit Windows 10 Application software App Store (iOS) Internet Explorer 4 Graphics Language localisation Email User interface Plug-in (computing) Screenshot Skin (computing) Non-commercial Megabyte

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report