CVE | Published | Severity | Details | Exploitability | Impact | Vector |
CVE‑2024‑6812 | 2024‑08‑21 16:15:09 | HIGH (8) | IrfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of WSQ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23273. | 2 | 6 | LOCAL |
CVE‑2024‑6811 | 2024‑08‑21 16:15:09 | HIGH (8) | IrfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of WSQ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24192. | 2 | 6 | LOCAL |
CVE‑2024‑44915 | 2024‑08‑28 18:15:10 | MEDIUM (6) | An issue in the component EXR!ReadEXR+0x4eef0 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS). | 2 | 4 | LOCAL |
CVE‑2024‑44914 | 2024‑08‑28 18:15:10 | MEDIUM (6) | An issue in the component EXR!ReadEXR+0x3df50 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS). | 2 | 4 | LOCAL |
CVE‑2024‑44913 | 2024‑08‑28 18:15:10 | MEDIUM (6) | An issue in the component EXR!ReadEXR+0x40ef1 of Irfanview v4.67.1.0 allows attackers to cause an access violation via a crafted EXR file. This vulnerability can lead to a Denial of Service (DoS). | 2 | 4 | LOCAL |
CVE‑2023‑26974 | 2023‑04‑04 16:15:07 | MEDIUM (6) | Irfanview v4.62 allows a user-mode write access violation via a crafted JPEG 2000 file starting at JPEG2000+0x0000000000001bf0. | 2 | 4 | LOCAL |
CVE‑2023‑24304 | 2023‑03‑28 21:15:11 | HIGH (8) | Improper input validation in the PDF.dll plugin of IrfanView v4.60 allows attackers to execute arbitrary code via opening a crafted PDF file. | 2 | 6 | LOCAL |
CVE‑2021‑46064 | 2022‑03‑23 18:15:09 | HIGH (8) | IrfanView 4.59 is vulnerable to buffer overflow via the function at address 0x413c70 (in 32bit version of the binary). The vulnerability triggers when the user opens malicious .tiff image. | 2 | 6 | LOCAL |
CVE‑2021‑29367 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in WPG+0x1dda of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted WPG file. | 2 | 6 | LOCAL |
CVE‑2021‑29366 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in FORMATS!GetPlugInInfo+0x2de9 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | 2 | 6 | LOCAL |
CVE‑2021‑29365 | 2021‑09‑28 16:15:08 | MEDIUM (6) | Irfanview 4.57 is affected by an infinite loop when processing a crafted BMP file in the EFFECTS!AutoCrop_W component. This can cause a denial of service (DOS). | 2 | 4 | LOCAL |
CVE‑2021‑29364 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in Formats!ReadRAS_W+0x1001 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | 2 | 6 | LOCAL |
CVE‑2021‑29363 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa74 | 2 | 6 | LOCAL |
CVE‑2021‑29362 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa30 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | 2 | 6 | LOCAL |
CVE‑2021‑29361 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in FORMATS!Read_Utah_RLE+0x340 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | 2 | 6 | LOCAL |
CVE‑2021‑29360 | 2021‑09‑28 16:15:08 | HIGH (8) | A buffer overflow vulnerability in FORMATS!Read_Utah_RLE+0x37a of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | 2 | 6 | LOCAL |
CVE‑2021‑29358 | 2021‑09‑28 16:15:08 | MEDIUM (6) | A buffer overflow vulnerability in FORMATS!ReadPVR_W+0xfa of Irfanview 4.57 allows attackers to cause a denial of service (DOS) via a crafted PVR file. | 2 | 4 | LOCAL |
CVE‑2021‑27362 | 2021‑02‑17 16:15:13 | CRITICAL (10) | The WPG plugin before 3.1.0.0 for IrfanView 4.57 has a Read Access Violation on Control Flow starting at WPG!ReadWPG_W+0x0000000000000133, which might allow remote attackers to execute arbitrary code. | 4 | 6 | NETWORK |
CVE‑2021‑27224 | 2021‑02‑17 16:15:13 | HIGH (8) | The WPG plugin before 3.1.0.0 for IrfanView 4.57 has a user-mode write access violation starting at WPG+0x0000000000012ec6, which might allow remote attackers to execute arbitrary code. | 4 | 4 | NETWORK |
CVE‑2020‑35133 | 2020‑12‑16 18:15:13 | HIGH (8) | irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb60. | 4 | 4 | NETWORK |
CVE‑2020‑23567 | 2021‑11‑05 17:15:11 | MEDIUM (6) | Irfanview v4.53 allows attackers to to cause a denial of service (DoS) via a crafted JPEG 2000 file. Related to "Integer Divide By Zero starting at JPEG2000!ShowPlugInSaveOptions_W+0x00000000000082ea" | 2 | 4 | LOCAL |
CVE‑2020‑23566 | 2021‑11‑05 17:15:11 | MEDIUM (6) | Irfanview v4.53 was discovered to contain an infinity loop via JPEG2000!ShowPlugInSaveOptions_W+0x1ecd8. | 2 | 4 | LOCAL |
CVE‑2020‑23565 | 2021‑11‑05 17:15:11 | HIGH (8) | Irfanview v4.53 allows attackers to execute arbitrary code via a crafted JPEG 2000 file. Related to a "Data from Faulting Address controls Branch Selection starting at JPEG2000!ShowPlugInSaveOptions_W+0x0000000000032850". | 2 | 6 | LOCAL |
CVE‑2020‑23563 | 2022‑07‑18 00:15:08 | MEDIUM (6) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000002cba. | 2 | 4 | LOCAL |
CVE‑2020‑23562 | 2022‑07‑18 00:15:08 | MEDIUM (6) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000000aefe. | 2 | 4 | LOCAL |
CVE‑2020‑23561 | 2022‑07‑18 00:15:08 | MEDIUM (6) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000005722. | 2 | 4 | LOCAL |
CVE‑2020‑23560 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000001bcab. | 2 | 6 | LOCAL |
CVE‑2020‑23559 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000007d7f. | 2 | 6 | LOCAL |
CVE‑2020‑23558 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000007f4b. | 2 | 6 | LOCAL |
CVE‑2020‑23557 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000000755d. | 2 | 6 | LOCAL |
CVE‑2020‑23556 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e28. | 2 | 6 | LOCAL |
CVE‑2020‑23555 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e6e. | 2 | 6 | LOCAL |
CVE‑2020‑23554 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e20. | 2 | 6 | LOCAL |
CVE‑2020‑23553 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007d33. | 2 | 6 | LOCAL |
CVE‑2020‑23552 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e62. | 2 | 6 | LOCAL |
CVE‑2020‑23551 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e30. | 2 | 6 | LOCAL |
CVE‑2020‑23550 | 2022‑09‑16 03:15:09 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e82. | 2 | 6 | LOCAL |
CVE‑2020‑23549 | 2021‑10‑28 22:15:08 | HIGH (8) | IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted .cr2 file, related to a "Data from Faulting Address controls Branch Selection starting at FORMATS!GetPlugInInfo+0x00000000000047f6". | 2 | 6 | LOCAL |
CVE‑2020‑23546 | 2021‑10‑28 22:15:08 | HIGH (8) | IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted XBM file, related to a "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FORMATS!ReadMosaic+0x0000000000000981. | 2 | 6 | LOCAL |
CVE‑2020‑23545 | 2021‑12‑15 08:15:07 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ReadXPM_W+0x0000000000000531. | 2 | 6 | LOCAL |
CVE‑2020‑13906 | 2020‑06‑10 19:15:10 | HIGH (8) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000038eb7. | 2 | 6 | LOCAL |
CVE‑2020‑13905 | 2020‑06‑10 19:15:10 | HIGH (9) | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000038ed4. | 3 | 6 | NETWORK |
CVE‑2019‑17258 | 2019‑10‑08 12:15:12 | HIGH (8) | IrfanView 4.53 allows Data from a Faulting Address to control a subsequent Write Address starting at JPEG_LS+0x000000000000839c. | 2 | 6 | LOCAL |
CVE‑2019‑17257 | 2019‑10‑08 12:15:12 | MEDIUM (6) | IrfanView 4.53 allows a Exception Handler Chain to be Corrupted starting at EXR!ReadEXR+0x000000000002af80. | 2 | 4 | LOCAL |
CVE‑2019‑17256 | 2019‑10‑08 12:15:12 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at DPX!ReadDPX_W+0x0000000000001203. | 2 | 6 | LOCAL |
CVE‑2019‑17255 | 2019‑10‑08 12:15:12 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at EXR!ReadEXR+0x0000000000010836. | 2 | 6 | LOCAL |
CVE‑2019‑17254 | 2019‑10‑08 12:15:12 | HIGH (8) | IrfanView 4.53 allows Data from a Faulting Address to control a subsequent Write Address starting at FORMATS!Read_BadPNG+0x0000000000000101. | 2 | 6 | LOCAL |
CVE‑2019‑17253 | 2019‑10‑08 12:15:12 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at JPEG_LS+0x000000000000a6b8. | 2 | 6 | LOCAL |
CVE‑2019‑17252 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at FORMATS!Read_BadPNG+0x0000000000000115. | 2 | 6 | LOCAL |
CVE‑2019‑17251 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at FORMATS!GetPlugInInfo+0x0000000000007d43. | 2 | 6 | LOCAL |
CVE‑2019‑17250 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x00000000000042f5. | 2 | 6 | LOCAL |
CVE‑2019‑17249 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x000000000000d57b. | 2 | 6 | LOCAL |
CVE‑2019‑17248 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x00000000000025b6. | 2 | 6 | LOCAL |
CVE‑2019‑17247 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows Data from a Faulting Address to control a subsequent Write Address starting at JPEG_LS+0x0000000000007da8. | 2 | 6 | LOCAL |
CVE‑2019‑17246 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x000000000000258c. | 2 | 6 | LOCAL |
CVE‑2019‑17245 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x0000000000004359. | 2 | 6 | LOCAL |
CVE‑2019‑17244 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows Data from a Faulting Address to control Code Flow starting at JPEG_LS+0x0000000000001d8a. | 2 | 6 | LOCAL |
CVE‑2019‑17243 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows Data from a Faulting Address to control Code Flow starting at JPEG_LS+0x0000000000003155. | 2 | 6 | LOCAL |
CVE‑2019‑17242 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x000000000000966f. | 2 | 6 | LOCAL |
CVE‑2019‑17241 | 2019‑10‑08 12:15:11 | HIGH (8) | IrfanView 4.53 allows a User Mode Write AV starting at WSQ!ReadWSQ+0x000000000000d563. | 2 | 6 | LOCAL |
CVE‑2019‑16887 | 2019‑09‑25 18:15:13 | HIGH (8) | In IrfanView 4.53, Data from a Faulting Address controls a subsequent Write Address starting at image00400000+0x000000000001dcfc. | 2 | 6 | LOCAL |
CVE‑2019‑13243 | 2019‑07‑04 16:15:11 | MEDIUM (7) | IrfanView 4.52 has a User Mode Write AV starting at image00400000+0x00000000000249c6. | 0 | 0 | NETWORK |
CVE‑2019‑13242 | 2019‑07‑04 16:15:11 | MEDIUM (7) | IrfanView 4.52 has a User Mode Write AV starting at image00400000+0x0000000000013a98. | 0 | 0 | NETWORK |
CVE‑2017‑9923 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at KERNELBASE!EnumResourceTypesInternal+0x0000000000000589." | 0 | 0 | LOCAL |
CVE‑2017‑9922 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpCompareResourceNames_U+0x0000000000000062." | 0 | 0 | LOCAL |
CVE‑2017‑9921 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpResGetMappingSize+0x00000000000003cc." | 0 | 0 | LOCAL |
CVE‑2017‑9920 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpResSearchResourceInsideDirectory+0x000000000000029e." | 0 | 0 | LOCAL |
CVE‑2017‑9919 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpResCompareResourceNames+0x0000000000000087." | 0 | 0 | LOCAL |
CVE‑2017‑9918 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at KERNELBASE!QueryOptionalDelayLoadedAPI+0x0000000000000c42." | 0 | 0 | LOCAL |
CVE‑2017‑9917 | 2017‑07‑05 20:29:05 | MEDIUM (4) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ntdll_77df0000!RtlFreeHandle+0x0000000000000218." | 0 | 0 | LOCAL |
CVE‑2017‑9916 | 2017‑07‑05 20:29:05 | MEDIUM (5) | IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlFreeHandle+0x00000000000001b6." | 0 | 0 | LOCAL |
CVE‑2017‑9915 | 2017‑07‑05 20:29:05 | MEDIUM (7) | IrfanView version 4.44 (32bit) with TOOLS plugin 4.50 allows attackers to execute arbitrary code or cause a denial of service via a crafted file, related to a "Read Access Violation on Block Data Move starting at ntdll_77df0000!memcpy+0x0000000000000033." | 0 | 0 | NETWORK |
CVE‑2017‑9892 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpFreeHeap+0x0000000000000393." | 0 | 0 | NETWORK |
CVE‑2017‑9891 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FPX!FPX_GetScanDevicePropertyGroup+0x0000000000007053." | 0 | 0 | NETWORK |
CVE‑2017‑9890 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to a "Read Access Violation starting at FPX+0x000000000000153a." | 0 | 0 | NETWORK |
CVE‑2017‑9889 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to a "Read Access Violation starting at FPX!FPX_GetScanDevicePropertyGroup+0x0000000000003714." | 0 | 0 | NETWORK |
CVE‑2017‑9888 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at FPX!FPX_GetScanDevicePropertyGroup+0x00000000000031a0." | 0 | 0 | NETWORK |
CVE‑2017‑9887 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FPX+0x000000000000688d." | 0 | 0 | NETWORK |
CVE‑2017‑9886 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpLowFragHeapFree+0x000000000000001f." | 0 | 0 | NETWORK |
CVE‑2017‑9885 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FPX!FPX_GetScanDevicePropertyGroup+0x0000000000006a98." | 0 | 0 | NETWORK |
CVE‑2017‑9884 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpCoalesceFreeBlocks+0x00000000000001b6." | 0 | 0 | NETWORK |
CVE‑2017‑9883 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls Code Flow starting at FPX+0x0000000000007216." | 0 | 0 | NETWORK |
CVE‑2017‑9882 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "Read Access Violation on Block Data Move starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000b84f." | 0 | 0 | NETWORK |
CVE‑2017‑9881 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls Code Flow starting at FPX!FPX_GetScanDevicePropertyGroup+0x00000000000014e7." | 0 | 0 | NETWORK |
CVE‑2017‑9880 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls Code Flow starting at FPX+0x0000000000007236." | 0 | 0 | NETWORK |
CVE‑2017‑9879 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls subsequent Write Address starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000a525." | 0 | 0 | NETWORK |
CVE‑2017‑9878 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "Read Access Violation on Control Flow starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000c99a." | 0 | 0 | NETWORK |
CVE‑2017‑9877 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls Code Flow starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000c998." | 0 | 0 | NETWORK |
CVE‑2017‑9876 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to "Data from Faulting Address controls Code Flow starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000c995." | 0 | 0 | NETWORK |
CVE‑2017‑9875 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!DE_Decode+0x0000000000000cdb." | 0 | 0 | NETWORK |
CVE‑2017‑9874 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!FPX_GetScanDevicePropertyGroup+0x0000000000007822." | 0 | 0 | NETWORK |
CVE‑2017‑9873 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "Read Access Violation on Control Flow starting at FPX!GetPlugInInfo+0x0000000000012bf2." | 0 | 0 | NETWORK |
CVE‑2017‑9536 | 2017‑07‑05 20:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "Read Access Violation on Control Flow starting at FPX!FPX_GetScanDevicePropertyGroup+0x00000000000014eb." | 0 | 0 | NETWORK |
CVE‑2017‑9535 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!GetPlugInInfo+0x0000000000016e53." | 0 | 0 | NETWORK |
CVE‑2017‑9534 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!GetPlugInInfo+0x0000000000017426." | 0 | 0 | NETWORK |
CVE‑2017‑9533 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!DE_Decode+0x0000000000000a9b." | 0 | 0 | NETWORK |
CVE‑2017‑9532 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX+0x0000000000001555." | 0 | 0 | NETWORK |
CVE‑2017‑9531 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX+0x000000000000176c." | 0 | 0 | NETWORK |
CVE‑2017‑9530 | 2017‑07‑05 20:29:03 | MEDIUM (4) | IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ntdll_77df0000!LdrpResCompareResourceNames+0x0000000000000150." | 0 | 0 | LOCAL |
CVE‑2017‑9528 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!FPX_GetScanDevicePropertyGroup+0x0000000000000f53." | 0 | 0 | NETWORK |
CVE‑2017‑8766 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) allows remote attackers to execute code via a crafted .mov file, because of a "User Mode Write AV near NULL" issue. | 0 | 0 | NETWORK |
CVE‑2017‑8370 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin 4.45 allows remote attackers to execute arbitrary code or cause a denial of service (Heap Corruption and application crash) in processing a FlashPix (.FPX) file, a different vulnerability than CVE-2017-7721. | 0 | 0 | NETWORK |
CVE‑2017‑8369 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) has a "Data from Faulting Address controls Branch Selection starting at USER32!wvsprintfA+0x00000000000002f3" issue, which might allow attackers to execute arbitrary code via a crafted file. | 0 | 0 | NETWORK |
CVE‑2017‑7721 | 2017‑04‑30 17:59:00 | MEDIUM (7) | IrfanView version 4.44 (32bit) with FPX Plugin before 4.45 has an Access Violation and crash in processing a FlashPix (.FPX) file. | 0 | 0 | NETWORK |
CVE‑2017‑2813 | 2017‑06‑21 19:29:00 | MEDIUM (7) | An exploitable integer overflow vulnerability exists in the JPEG 2000 parser functionality of IrfanView 4.44. A specially crafted jpeg2000 image can cause an integer overflow leading to wrong memory allocation resulting in arbitrary code execution. Vulnerability can be triggered by viewing the image in via the application or by using thumbnailing feature of IrfanView. | 0 | 0 | NETWORK |
CVE‑2017‑15769 | 2017‑10‑22 20:29:02 | MEDIUM (7) | IrfanView 4.50 - 64bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dds file, related to "Read Access Violation starting at FORMATS!ReadBLP_W+0x0000000000001b22." | 0 | 0 | NETWORK |
CVE‑2017‑15768 | 2017‑10‑22 20:29:02 | MEDIUM (7) | IrfanView version 4.50 - 64bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .tif file, related to "Data from Faulting Address controls Branch Selection starting at image000007f7_42060000+0x0000000000094113." | 0 | 0 | NETWORK |
CVE‑2017‑15767 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at CADIMAGE+0x00000000003d5b52." | 0 | 0 | NETWORK |
CVE‑2017‑15766 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001f0a0." | 0 | 0 | NETWORK |
CVE‑2017‑15765 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at CADIMAGE+0x00000000003e9462." | 0 | 0 | NETWORK |
CVE‑2017‑15764 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001e6b0." | 0 | 0 | NETWORK |
CVE‑2017‑15763 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001eca0." | 0 | 0 | NETWORK |
CVE‑2017‑15762 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001f31b." | 0 | 0 | NETWORK |
CVE‑2017‑15761 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001ecaa." | 0 | 0 | NETWORK |
CVE‑2017‑15760 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001ce82." | 0 | 0 | NETWORK |
CVE‑2017‑15759 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001b3f3." | 0 | 0 | NETWORK |
CVE‑2017‑15758 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000004d75b." | 0 | 0 | NETWORK |
CVE‑2017‑15757 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at BabaCAD4Image!ShowPlugInOptions+0x00000000000029ba." | 0 | 0 | NETWORK |
CVE‑2017‑15756 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000004d7c4." | 0 | 0 | NETWORK |
CVE‑2017‑15755 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at verifier!AVrfpDphFindBusyMemoryNoCheck+0x0000000000000091." | 0 | 0 | NETWORK |
CVE‑2017‑15754 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x0000000000013968." | 0 | 0 | NETWORK |
CVE‑2017‑15753 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at BabaCAD4Image!ShowPlugInOptions+0x00000000000029c2." | 0 | 0 | NETWORK |
CVE‑2017‑15752 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000004d6b0." | 0 | 0 | NETWORK |
CVE‑2017‑15751 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x0000000000009f39." | 0 | 0 | NETWORK |
CVE‑2017‑15750 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x0000000000009ae0." | 0 | 0 | NETWORK |
CVE‑2017‑15749 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADIMAGE+0x00000000000348b9." | 0 | 0 | NETWORK |
CVE‑2017‑15748 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV starting at CADIMAGE+0x000000000000613a." | 0 | 0 | NETWORK |
CVE‑2017‑15747 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "Data Execution Prevention Violation starting at Unknown Symbol @ 0x0000700b00260112 called from CADIMAGE+0x00000000003d35ad." | 0 | 0 | NETWORK |
CVE‑2017‑15746 | 2017‑10‑22 20:29:01 | HIGH (8) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADIMAGE+0x00000000003d21b3." | 2 | 6 | LOCAL |
CVE‑2017‑15745 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADIMAGE+0x000000000002ca2e." | 0 | 0 | NETWORK |
CVE‑2017‑15744 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "Read Access Violation on Control Flow starting at CADIMAGE+0x00000000003d35a7." | 0 | 0 | NETWORK |
CVE‑2017‑15743 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address may be used as a return value starting at CADIMAGE+0x00000000003d24a0." | 0 | 0 | NETWORK |
CVE‑2017‑15742 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at CADIMAGE+0x00000000003d2328." | 0 | 0 | NETWORK |
CVE‑2017‑15741 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Possible Stack Corruption starting at CADIMAGE+0x00000000003d2378." | 0 | 0 | NETWORK |
CVE‑2017‑15740 | 2017‑10‑22 20:29:01 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls Code Flow starting at CADIMAGE+0x000000000033228e." | 0 | 0 | NETWORK |
CVE‑2017‑15739 | 2017‑10‑22 20:29:00 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at CADIMAGE+0x00000000000042d5." | 0 | 0 | NETWORK |
CVE‑2017‑15738 | 2017‑10‑22 20:29:00 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at CADIMAGE+0x00000000003d22d8." | 0 | 0 | NETWORK |
CVE‑2017‑15737 | 2017‑10‑22 20:29:00 | MEDIUM (7) | IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at CADIMAGE+0x00000000003d246f." | 0 | 0 | NETWORK |
CVE‑2017‑15264 | 2017‑10‑11 18:29:05 | MEDIUM (7) | IrfanView version 4.44 (32bit) allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .tif file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at image00000000_00400000+0x00000000000236e4." | 0 | 0 | NETWORK |
CVE‑2017‑15263 | 2017‑10‑11 18:29:05 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlListWalk+0x00000000000166c4." | 0 | 0 | NETWORK |
CVE‑2017‑15262 | 2017‑10‑11 18:29:05 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x0000000000048d0c." | 0 | 0 | NETWORK |
CVE‑2017‑15261 | 2017‑10‑11 18:29:05 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Possible Stack Corruption starting at PDF!xmlGetGlobalState+0x0000000000057b35." | 0 | 0 | NETWORK |
CVE‑2017‑15260 | 2017‑10‑11 18:29:05 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address may be used as a return value starting at PDF!xmlParserInputRead+0x0000000000129a59." | 0 | 0 | NETWORK |
CVE‑2017‑15259 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x000000000011624a." | 0 | 0 | NETWORK |
CVE‑2017‑15258 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x0000000000161a9c." | 0 | 0 | NETWORK |
CVE‑2017‑15257 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x000000000009174a." | 0 | 0 | NETWORK |
CVE‑2017‑15256 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlListWalk+0x0000000000019fc8." | 0 | 0 | NETWORK |
CVE‑2017‑15255 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x00000000001601b0." | 0 | 0 | NETWORK |
CVE‑2017‑15254 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlGetGlobalState+0x000000000007dfa5." | 0 | 0 | NETWORK |
CVE‑2017‑15253 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "User Mode Write AV starting at PDF!xmlGetGlobalState+0x000000000007dff2." | 0 | 0 | NETWORK |
CVE‑2017‑15252 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "Read Access Violation on Block Data Move starting at PDF!xmlListWalk+0x00000000000158cb." | 0 | 0 | NETWORK |
CVE‑2017‑15251 | 2017‑10‑11 18:29:04 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x00000000000e7326." | 0 | 0 | NETWORK |
CVE‑2017‑15250 | 2017‑10‑11 18:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x0000000000132e19." | 0 | 0 | NETWORK |
CVE‑2017‑15249 | 2017‑10‑11 18:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlGetGlobalState+0x00000000000668d6." | 0 | 0 | NETWORK |
CVE‑2017‑15248 | 2017‑10‑11 18:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlGetGlobalState+0x0000000000063ca6." | 0 | 0 | NETWORK |
CVE‑2017‑15247 | 2017‑10‑11 18:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000001168a1." | 0 | 0 | NETWORK |
CVE‑2017‑15246 | 2017‑10‑11 18:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "Read Access Violation on Block Data Move starting at PDF!xmlListWalk+0x000000000001515b." | 0 | 0 | NETWORK |
CVE‑2017‑15245 | 2017‑10‑11 18:29:03 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlGetGlobalState+0x0000000000057b76." | 0 | 0 | NETWORK |
CVE‑2017‑15244 | 2017‑10‑11 18:29:02 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to an "Error Code (0xe06d7363) starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | 0 | 0 | NETWORK |
CVE‑2017‑15243 | 2017‑10‑11 18:29:02 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Possible Stack Corruption starting at PDF!xmlGetGlobalState+0x00000000000568a4." | 0 | 0 | NETWORK |
CVE‑2017‑15242 | 2017‑10‑11 18:29:02 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "User Mode Write AV starting at PDF!xmlGetGlobalState+0x0000000000031abe." | 0 | 0 | NETWORK |
CVE‑2017‑15241 | 2017‑10‑11 18:29:02 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000000929f5." | 0 | 0 | NETWORK |
CVE‑2017‑15240 | 2017‑10‑11 18:29:02 | MEDIUM (7) | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x0000000000132cef." | 0 | 0 | NETWORK |
CVE‑2017‑15239 | 2017‑10‑11 18:29:01 | MEDIUM (7) | IrfanView 4.44 - 32bit with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address may be used as a return value starting at PDF!xmlParserInputRead+0x0000000000040db4." | 0 | 0 | NETWORK |
CVE‑2017‑14693 | 2017‑09‑22 08:29:00 | MEDIUM (5) | IrfanView 4.44 - 32bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .djvu file, related to "Data from Faulting Address controls Branch Selection starting at DJVU!GetPlugInInfo+0x000000000001c613." | 0 | 0 | LOCAL |
CVE‑2017‑14578 | 2017‑09‑18 17:29:02 | MEDIUM (5) | IrfanView 4.44 - 32bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ani file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77130000!RtlpCoalesceFreeBlocks+0x00000000000004b4." | 0 | 0 | LOCAL |
CVE‑2017‑14540 | 2017‑09‑18 17:29:00 | MEDIUM (5) | IrfanView 4.44 - 32bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .svg file, related to "Data from Faulting Address controls Branch Selection starting at CADIMAGE+0x000000000001f23e." | 0 | 0 | LOCAL |
CVE‑2017‑14539 | 2017‑09‑18 17:29:00 | MEDIUM (5) | IrfanView 4.44 - 32bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .svg file, related to "Data from Faulting Address controls Branch Selection starting at image00000000_00400000+0x000000000011d767." | 0 | 0 | LOCAL |
CVE‑2017‑10926 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView 4.44 (32bit) with FPX Plugin 4.47 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to a "Read Access Violation starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | 0 | 0 | NETWORK |
CVE‑2017‑10925 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView 4.44 (32bit) with FPX Plugin 4.47 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000b3ae." | 0 | 0 | NETWORK |
CVE‑2017‑10924 | 2017‑07‑05 20:29:03 | MEDIUM (7) | IrfanView 4.44 (32bit) with FPX Plugin 4.47 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000a529." | 0 | 0 | NETWORK |
CVE‑2017‑10735 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpFreeHeap+0x00000000000003ca." | 0 | 0 | NETWORK |
CVE‑2017‑10734 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to an "Invalid Handle starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | 0 | 0 | NETWORK |
CVE‑2017‑10733 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpEnterCriticalSectionContended+0x0000000000000031." | 0 | 0 | NETWORK |
CVE‑2017‑10732 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpAllocateHeap+0x0000000000000429." | 0 | 0 | NETWORK |
CVE‑2017‑10731 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "User Mode Write AV starting at FORMATS!GetPlugInInfo+0x0000000000007d80." | 0 | 0 | NETWORK |
CVE‑2017‑10730 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "User Mode Write AV starting at FORMATS!GetPlugInInfo+0x0000000000007d96." | 0 | 0 | NETWORK |
CVE‑2017‑10729 | 2017‑07‑05 20:29:01 | MEDIUM (7) | IrfanView version 4.44 (32bit) allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "User Mode Write AV starting at ntdll_77df0000!RtlpWaitOnCriticalSection+0x0000000000000121." | 0 | 0 | NETWORK |
CVE‑2013‑6932 | 2013‑12‑28 04:53:07 | HIGH (8) | Buffer overflow in IrfanView before 4.37, when a multibyte-character directory name is used, allows user-assisted remote attackers to execute arbitrary code via a crafted file that is incorrectly handled by the Thumbnail tooltips feature in the Thumbnails window. | 0 | 0 | NETWORK |
CVE‑2013‑5351 | 2014‑02‑14 19:55:25 | HIGH (8) | Heap-based buffer overflow in IrfanView before 4.37 allows remote attackers to execute arbitrary code via the LZW code stream in a GIF file. | 0 | 0 | NETWORK |
CVE‑2012‑5904 | 2012‑11‑17 21:55:05 | MEDIUM (7) | Heap-based buffer overflow in IrfanView before 4.33 allows remote attackers to execute arbitrary code via a crafted RLE compressed bitmap file such as a DIB, RLE, or BMP image. | 0 | 0 | NETWORK |
CVE‑2012‑3585 | 2012‑07‑05 22:55:01 | HIGH (9) | Heap-based buffer overflow in jpeg_ls.dll in the Jpeg_LS (aka JLS) plugin in the formats plugins in IrfanView PlugIns before 4.34 allows remote attackers to execute arbitrary code via a crafted JLS file. | 0 | 0 | NETWORK |
CVE‑2012‑0897 | 2012‑01‑20 17:55:02 | MEDIUM (7) | Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns before 4.33 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment. | 0 | 0 | NETWORK |
CVE‑2012‑0278 | 2012‑04‑18 10:33:33 | HIGH (9) | Heap-based buffer overflow in the FlashPix PlugIn before 4.3.4.0 for IrfanView might allow remote attackers to execute arbitrary code via a .fpx file containing a crafted FlashPix image that is not properly handled during decompression. | 0 | 0 | NETWORK |
CVE‑2011‑5233 | 2012‑10‑25 17:55:08 | MEDIUM (4) | Heap-based buffer overflow in IrfanView before 4.32 allows remote attackers to execute arbitrary code via crafted "Rows Per Strip" and "Samples Per Pixel" values in a TIFF image file. | 0 | 0 | NETWORK |
CVE‑2010‑1510 | 2010‑05‑14 19:30:01 | MEDIUM (5) | Heap-based buffer overflow in IrfanView before 4.27 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PSD image with RLE compression. | 0 | 0 | NETWORK |
CVE‑2010‑1509 | 2010‑05‑14 19:30:01 | MEDIUM (5) | IrfanView before 4.27 does not properly handle an unspecified integer variable during processing of PSD images, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow, related to a "sign-extension error." | 0 | 0 | NETWORK |
Patch more applications, achieve compliance, and prevent problems while reducing stress with Lavawall®.
A security tool by security auditors. From Passkeys and Argon2i to source validation and MVSP principles, Lavawall® has you covered.
More features and more security added nearly every day.
While Ninite and other patching tools have had the same patch offerings for decades, we're monitoring stats to keep adding the most useful prorgams.
From wrapping TLS communications in extra encryption and uninstalling remote support tools when they aren't used to detailed statistical analysis of system and network performance, Lavawall® goes in-depth.
Lavawall®p; goes beyond patches and breach detection. We also monitor for risky Chromium extensions and allowed notifications that might be part of a phishing or ransomware attack.
Extend the security features of Cloudflare, Microsoft, Google, Sophos, and other cloud providers to create a Lavawall® of protection
Even if you used breached remote management tools like ScreenConnect through Lavawall® when it was vulnerable, your computers stayed safe because we only install the agent when it needs to be used.
Easily deploy, monitor, and analyze security tools like Huntress, AutoElevate, and Sophos. Magically gain details from ZenDesk, ConnectWise, Datto, Panorama9, Microsoft, and Google.
Get immediate fixes, user notifications, admin notifications -- and even security-certified human level 3 support when our advanced statistical analysis confirms a problem or anomaly.
2024‑10‑30 | 0.12.8.195 | Mac update refinements |
2024‑10‑25 | 0.12.3.190 | |
2024‑10‑21 | 0.12.0.187 | Macos implementaiton, linux and windows improvements |
2024‑10‑16 | 0.11.128.186 | Linux stats and system information improvements, improvements for application shutdown |
2024‑09‑12 | 0.11.113.171 | CPU Optimizations and Packages reliability improvements |
2024‑09‑05 | 0.11.106.164 | Phased deployment enhancements |
2024‑09‑04 | 0.11.103.161 | |
2024‑09‑02 | 0.11.102.160 | CPU Optimizations and Packages reliability improvements |
2024‑08‑30 | 0.11.99.157 | CPU Optimizations and Packages reliability improvements |
2024‑08‑29 | 0.11.98.156 | CPU utilization and console event optimization |
2024‑08‑28 | 0.11.97.155 | Reliability to detect unusual updates like redistributables. |
2024‑08‑27 | 0.11.96.154 | |
2024‑08‑26 | 0.11.95.153 | Faster response for reboot requests |
2024‑08‑20 | 0.11.92.150 | Additional package upgrade pre-requisites |
2024‑08‑15 | 0.11.89.147 | |
2024‑08‑06 | 0.11.87.145 | |
2024‑07‑26 | 0.11.83.141 | Add resiliency for MAC duplicates and uptime |
2024‑07‑25 | 0.11.82.140 | Changes to facilitate cross-platform use. Bitlocker and Windows key refinements |
2024‑07‑15 | 0.11.80.138 | Antivirus and temperature added to configuration checks |
2024‑07‑15 | 0.11.79.137 | Add configuration checks for execution policy and secure boot |
2024‑07‑11 | 0.11.77.135 | load balancing refinements |
2024‑07‑10 | 0.11.76.134 | Add additional load balancing and data residency capabilities, add randomness to recurring task timings to decrease server load |
2024‑07‑05 | 0.11.74.132 | changes to graph and residual work on user imporsonation |
2024‑07‑04 | 0.11.73.131 | Add configuration checks for execution policy and secure boot. |
2024‑07‑03 | 0.11.72.130 | Enhanced event log monitoring |
2024‑07‑02 | 0.11.71.129 | Add details to Windows updates, enhanced risk metrics for application patches |
2024‑06‑19 | 0.11.65.123 | Update resiliancy and garbage collection |
2024‑06‑13 | 0.11.60.118 | Enhanced logging |
2024‑06‑12 | 0.11.55.113 | Include the primary drive serial number; MAC addresses for built-in wireless, Bluetooth, and ethernet into the device hash to restore uninstalled and reinstalled devices in cases where the motherboard serial is not unique |
2024‑06‑07 | 0.11.54.112 | Patch and package uninstall data addition |
2024‑06‑05 | 0.11.47.105 | refine per-user registry application listing |
2024‑06‑02 | 0.11.45.103 | uninstall and reinstall refinements, refine local logging, refine self-update and uninstall timing |
2024‑05‑30 | 0.11.21.79 | various bug fixes and improvements |
2024‑05‑28 | 0.11.16.74 | Error logging, registration, and uninstall improvements. |
2024‑05‑24 | 0.11.14.72 | applied changes for devices and login commands, changes for registration as well |
2024‑05‑22 | 0.11.13.71 | Add Windows computer model, improve Operating System parsing |
2024‑05‑21 | 0.11.11.69 | Added additional states for Windows update, flexibility for non-standard program file configurations, support for network diagrams at the switch level, details for Windows editions |
2024‑05‑21 | 0.11.10.68 | Add specific cases for Defender patterns and Composer versions. |
2024‑05‑17 | 0.11.3.61 | Change Log storage location to c:\program files\Lavawall |
2024‑05‑17 | 0.11.1.59 | self-update improvements. |
2024‑05‑16 | 0.8.0.55 | error log reporting and management. |
2024‑05‑15 | 0.7.0.54 | Websocket resiliency improvements |
2024‑05‑09 | 0.6.0.53 | Error log reporting and management. |
2024‑05‑01 | 0.5.44.52 | Even more improvements to scheduler |
2024‑04‑24 | 0.5.41.49 | Install compatibility with Sandbox |
2024‑04‑22 | 0.5.21.29 | Project property changes to enable automated compilation with new features. |
2024‑04‑20 | 0.5.20.28 | Add motherboard serial number and company reassignment |
2024‑04‑11 | 0.5.4.12 | Automate release notes as part of build process |
2024‑04‑03 | 0.5.3.11 | Websocket and service enhancements |
2024‑03‑21 | 0.5.2.10 | Enhance zip file validation |
2024‑05‑20 | 253 | Added cleanup of old .json files during a re-install |
2024‑05‑13 | 252 | Added apt-get update to install |
2024‑05‑06 | 248 | Allow restart to use /var/run/reboot-required if needrestart is not installed |
2024‑04‑22 | 239 | Improve internal update and version tracking |
2024‑04‑15 | 235 | Add support for Yum packages |
2024‑04‑08 | 233 | Align patching with Windows patch reporting |
2024‑04‑02 | 228 | Add support for needrestart |
2024‑03‑04 | 224 | Schedule restarts |
2024‑03‑25 | 221 | Add support for apt packages |
2024‑03‑18 | 212 | Implement release management |
2024‑03‑11 | 202 | Add user login monitoring |
2024‑03‑04 | 189 | Enhance installation reliability |
2024‑02‑26 | 187 | Exapand triggers to identify if the instance needs to be restarted |
2024‑02‑19 | 146 | Improve compatibility for non-AWS instances |
2024‑02‑14 | 138 | Add self-uninstall capabilities |
2024‑02‑12 | 135 | Enhance scheduling flexibility |
2024‑02‑07 | 132 | Add kernel version tracking |
2024‑02‑05 | 124 | Add device hash to cryptographic self-update script validation |
2024‑01‑29 | 107 | Enhance encryption of patch data |
2024‑01‑22 | 98 | Improve how available storage is calculated |
2024‑01‑15 | 97 | Move initial tasks from installation file to sub scripts |
2024‑05‑21 | 91 | Improve multi-distribution compatibility |
2024‑05‑21 | 79 | Improve encryption reliability |
2023‑12‑11 | 68 | Enhance cryptographic validation of new scripts before updating |
2023‑11‑20 | 62 | Add inner layer of AES encryption in case TLS inspection doesn't allow for a secure connection |
2023‑11‑27 | 56 | Additional base cases for resiliancy |
2023‑11‑20 | 54 | Additional headers added to authentication process during installation. |
2023‑11‑20 | 53 | Enhanced key management |
2023‑11‑15 | 51 | Add insecure installation parameter to allow installation in environments with TLS inspection or other machine-in-the-middle situations. |
2023‑11‑06 | 42 | Enhance redundant encryption during installation. |
2023‑10‑30 | 33 | Improve install-over compatibility |
2023‑10‑23 | 18 | Add reboot configuration and scheduling |
2023‑10‑23 | 17 | Add self-updating functionality. |
2023‑10‑16 | 15 | Add Linux patching information for apt |
2023‑10‑09 | 14 | Collect system information |
2023‑10‑09 | 13 | Add Linux distribution information |
2023‑09‑30 | 12 | Add memory monitoring |
2023‑09‑30 | 10 | Add hardware information |
2023‑09‑23 | 9 | Add AWS information |
2023‑09‑23 | 8 | Add customized schedule capability for configuration updates |
2023‑09‑23 | 7 | Add support for package monitoring using package and dpkg logs |
2023‑09‑16 | 6 | Add storage data configuration gathering |
2023‑09‑16 | 5 | Add CPU information |
Lavawall® is under active development with the latest release on
Interfaces
Monitored Applications
System Metrics
Lavawall® prevents the 80% of breaches and failed audits due to missing patches and updates.
You can reduce application patching delays from 67 days to nearly immediate with the 150+ applications that Lavawall® monitors and patches.
You need to get your arms around compliance and security and don't want to get locked into “high watermark” monthly invoices or multi-year contracts.
Pay-as-you-need monthly pricing
DIY, full management, and coaching options
CMMI, PCI, SOC2, Canadian Cybersecurity, Minimum Viable Secure Product, and other compliance support
Simple pricing. No hidden fees. Advanced features for you business.
Security-focused RMM
Unlimited end-user support
Improve your IT performance
If you can not find answer to your question in our FAQ, you can always contact us or email us. We will answer you shortly!
Have a quick question and don't want to talk? Send us a quick note with the form below and we'll reply within one business day.