CVE-2013-5351

Heap-based buffer overflow in IrfanView before 4.37 allows remote attackers to execute arbitrary code via the LZW code stream in a GIF file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
irfanviewirfanview
𝑥
≤ 4.36
irfanviewirfanview
1.70
irfanviewirfanview
1.75
irfanviewirfanview
1.80
irfanviewirfanview
1.85
irfanviewirfanview
1.90
irfanviewirfanview
1.95
irfanviewirfanview
1.97
irfanviewirfanview
1.98
irfanviewirfanview
1.98a:a
irfanviewirfanview
1.99
irfanviewirfanview
2.00
irfanviewirfanview
2.05
irfanviewirfanview
2.07
irfanviewirfanview
2.10
irfanviewirfanview
2.12
irfanviewirfanview
2.15
irfanviewirfanview
2.17
irfanviewirfanview
2.18
irfanviewirfanview
2.20
irfanviewirfanview
2.22
irfanviewirfanview
2.25
irfanviewirfanview
2.27
irfanviewirfanview
2.30
irfanviewirfanview
2.32
irfanviewirfanview
2.35
irfanviewirfanview
2.37
irfanviewirfanview
2.40
irfanviewirfanview
2.50
irfanviewirfanview
2.52
irfanviewirfanview
2.55
irfanviewirfanview
2.60
irfanviewirfanview
2.62
irfanviewirfanview
2.63
irfanviewirfanview
2.65
irfanviewirfanview
2.66
irfanviewirfanview
2.68
irfanviewirfanview
2.80
irfanviewirfanview
2.82
irfanviewirfanview
2.83
irfanviewirfanview
2.85
irfanviewirfanview
2.90
irfanviewirfanview
2.92
irfanviewirfanview
2.95
irfanviewirfanview
2.97
irfanviewirfanview
2.98
irfanviewirfanview
3.00
irfanviewirfanview
3.0.7
irfanviewirfanview
3.02
irfanviewirfanview
3.05
irfanviewirfanview
3.07
irfanviewirfanview
3.10
irfanviewirfanview
3.12
irfanviewirfanview
3.15
irfanviewirfanview
3.17
irfanviewirfanview
3.20
irfanviewirfanview
3.21
irfanviewirfanview
3.25
irfanviewirfanview
3.30
irfanviewirfanview
3.33
irfanviewirfanview
3.35
irfanviewirfanview
3.36
irfanviewirfanview
3.50
irfanviewirfanview
3.51
irfanviewirfanview
3.60
irfanviewirfanview
3.61
irfanviewirfanview
3.70
irfanviewirfanview
3.75
irfanviewirfanview
3.80
irfanviewirfanview
3.85
irfanviewirfanview
3.90
irfanviewirfanview
3.91
irfanviewirfanview
3.92
irfanviewirfanview
3.95
irfanviewirfanview
3.97
irfanviewirfanview
3.98
irfanviewirfanview
3.99
irfanviewirfanview
4.00
irfanviewirfanview
4.10
irfanviewirfanview
4.20
irfanviewirfanview
4.22
irfanviewirfanview
4.23
irfanviewirfanview
4.25
irfanviewirfanview
4.27
irfanviewirfanview
4.28
irfanviewirfanview
4.30
irfanviewirfanview
4.32
irfanviewirfanview
4.33
irfanviewirfanview
4.35
𝑥
= Vulnerable software versions