Xfigproject Xfigproject

Do you want an email whenever new security vulnerabilities are reported in any Xfigproject product?

Products by Xfigproject Sorted by Most Security Vulnerabilities since 2018

Xfigproject Fig2dev10 vulnerabilities

Xfigproject Xfig1 vulnerability

By the Year

In 2022 there have been 0 vulnerabilities in Xfigproject . Last year Xfigproject had 8 security vulnerabilities published. Right now, Xfigproject is on track to have less security vulnerabilities in 2022 than it did last year.

Year Vulnerabilities Average Score
2022 0 0.00
2021 8 5.50
2020 0 0.00
2019 3 5.50
2018 0 0.00

It may take a day or so for new Xfigproject vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Xfigproject Security Vulnerabilities

An issue was discovered in fig2dev before 3.2.8

CVE-2021-32280 5.5 - Medium - September 20, 2021

An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8.

NULL Pointer Dereference

fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c.

CVE-2020-21535 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c.

Buffer Overflow

fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.

CVE-2020-21529 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.

Memory Corruption

fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c.

CVE-2020-21534 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c.

Classic Buffer Overflow

fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.

CVE-2020-21533 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.

Memory Corruption

fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.

CVE-2020-21532 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.

Classic Buffer Overflow

fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.

CVE-2020-21531 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.

Classic Buffer Overflow

fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c.

CVE-2020-21530 5.5 - Medium - September 16, 2021

fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c.

read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.

CVE-2019-19797 5.5 - Medium - December 15, 2019

read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.

Memory Corruption

read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow

CVE-2019-19555 5.5 - Medium - December 04, 2019

read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.

Memory Corruption

Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.

CVE-2019-14275 5.5 - Medium - July 26, 2019

Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.

Memory Corruption

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.