LibreDWG 0.12.4.4608 dwg.c dwg_read_file double free

A vulnerability was found in LibreDWG 0.12.4.4608 (Image Processing Software). It has been rated as critical. Affected by this issue is the function dwg_read_file of the file dwg.c. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

023
117

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%26
50%14

Approve Conf

90%26
80%14
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1264287206/23/2022VulD...price_0day$0-$5ksee exploit price documentation06/23/2022accepted
90
1264287106/23/2022VulD...cvss3_meta_tempscore5.5see CVSS documentation06/23/2022accepted
90
1264287006/23/2022VulD...cvss3_meta_basescore5.5see CVSS documentation06/23/2022accepted
90
1264286906/23/2022VulD...cvss3_vuldb_tempscore5.5see CVSS documentation06/23/2022accepted
90
1264286806/23/2022VulD...cvss3_vuldb_basescore5.5see CVSS documentation06/23/2022accepted
90
1264286706/23/2022VulD...cvss2_vuldb_tempscore4.9see CVSS documentation06/23/2022accepted
90
1264286606/23/2022VulD...cvss2_vuldb_basescore4.9see CVSS documentation06/23/2022accepted
90
1264286506/23/2022VulD...cvss3_vuldb_rlXderived from historical data06/23/2022accepted
80
1264286406/23/2022VulD...cvss3_vuldb_eXderived from historical data06/23/2022accepted
80
1264286306/23/2022VulD...cvss3_vuldb_prLderived from historical data06/23/2022accepted
80
1264286206/23/2022VulD...cvss3_vuldb_acLderived from historical data06/23/2022accepted
80
1264286106/23/2022VulD...cvss3_vuldb_avAderived from historical data06/23/2022accepted
80
1264286006/23/2022VulD...cvss2_vuldb_rlNDderived from historical data06/23/2022accepted
80
1264285906/23/2022VulD...cvss2_vuldb_eNDderived from historical data06/23/2022accepted
80
1264285806/23/2022VulD...cvss2_vuldb_auSderived from historical data06/23/2022accepted
80
1264285706/23/2022VulD...cvss2_vuldb_acMderived from historical data06/23/2022accepted
80
1264285606/23/2022VulD...cvss2_vuldb_avAderived from historical data06/23/2022accepted
80
1264285506/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector06/23/2022accepted
80
1264285406/23/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector06/23/2022accepted
80
1264285306/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector06/23/2022accepted
80

20 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!