Vulnerabilities
Vulnerable Software
Leptonica:  >> Leptonica  >> 1.56  Security Vulnerabilities
An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.
CVSS Score
6.5
EPSS Score
0.002
Published
2022-09-09
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixFewColorsOctcubeQuantMixed in colorquant1.c.
CVSS Score
7.5
EPSS Score
0.018
Published
2021-03-12
Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.
CVSS Score
7.5
EPSS Score
0.024
Published
2021-03-12
Leptonica before 1.80.0 allows a heap-based buffer over-read in rasteropGeneralLow, related to adaptmap_reg.c and adaptmap.c.
CVSS Score
7.5
EPSS Score
0.031
Published
2021-03-12
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c.
CVSS Score
7.5
EPSS Score
0.018
Published
2021-03-12
Leptonica before 1.80.0 allows a denial of service (application crash) via an incorrect left shift in pixConvert2To8 in pixconv.c.
CVSS Score
7.5
EPSS Score
0.041
Published
2021-03-11
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function allows command injection via a $(command) approach in the gplot rootname argument. This issue exists because of an incomplete fix for CVE-2018-3836.
CVSS Score
9.8
EPSS Score
0.017
Published
2018-02-23
Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
CVSS Score
7.0
EPSS Score
0.0
Published
2018-02-23
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function does not block '/' characters in the gplot rootname argument, potentially leading to path traversal and arbitrary file overwrite.
CVSS Score
9.1
EPSS Score
0.002
Published
2018-02-23
An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact.
CVSS Score
9.8
EPSS Score
0.004
Published
2018-02-19


Contact Us

Shodan ® - All rights reserved