Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Jhead
(Jhead_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 19 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-05-30 | CVE-2025-44906 | jhead v3.08 was discovered to contain a heap-use-after-free via the ProcessFile function at jhead.c. | Jhead | N/A | ||
2022-10-17 | CVE-2022-41751 | Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option. | Debian_linux, Fedora, Jhead | 7.8 | ||
2022-10-17 | CVE-2022-41751 | Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option. | Debian_linux, Fedora, Jhead | 7.8 | ||
2022-02-02 | CVE-2020-26208 | JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue. | Jhead | 6.1 | ||
2022-11-04 | CVE-2021-34055 | jhead 3.06 is vulnerable to Buffer Overflow via exif.c in function Put16u. | Debian_linux, Jhead | 7.8 | ||
2023-06-13 | CVE-2022-28550 | Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given. | Jhead | 9.8 | ||
2020-01-09 | CVE-2020-6624 | jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c. | Jhead | 7.1 | ||
2020-01-09 | CVE-2020-6625 | jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c. | Jhead | 7.1 | ||
2021-04-22 | CVE-2021-3496 | A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file. | Jhead | 7.8 | ||
2022-03-23 | CVE-2021-28275 | A Denial of Service vulnerability exists in jhead 3.04 and 3.05 due to a wild address read in the Get16u function in exif.c in will cause segmentation fault via a crafted_file. | Jhead | 5.5 |