Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Fig2dev
(Xfig_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 10 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-09-16 | CVE-2020-21529 | fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-16 | CVE-2020-21530 | fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-16 | CVE-2020-21531 | fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-16 | CVE-2020-21532 | fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-16 | CVE-2020-21533 | fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-16 | CVE-2020-21534 | fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-16 | CVE-2020-21535 | fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c. | Debian_linux, Fig2dev | 5.5 | ||
2021-09-20 | CVE-2021-32280 | An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8. | Debian_linux, Fig2dev | 5.5 | ||
2019-12-15 | CVE-2019-19797 | read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write. | Debian_linux, Fedora, Fig2dev | 5.5 | ||
2019-07-26 | CVE-2019-14275 | Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c. | Debian_linux, Leap, Fig2dev | 5.5 |