InternationalColorConsortium/DemoIccMAX vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|InternationalColorConsortium/DemoIccMAX package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Integer Overflow or Wraparound

[,2.3.1.1)
  • H
Improper Handling of Length Parameter Inconsistency

[0,)
  • H
Improper Handling of Length Parameter Inconsistency

[0,)
  • H
Improper Handling of Length Parameter Inconsistency

[0,)
  • H
Attempt to Access Child of a Non-structure Pointer

[,2.3.1.2)
  • H
Incorrect Conversion between Numeric Types

[,2.3.1.2)
  • M
Use of Uninitialized Variable

[,2.3.1.2)
  • M
Improper Neutralization

[,2.3.1.2)
  • H
Integer Overflow or Wraparound

[,2.3.1.2)
  • H
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

[,2.3.1.1)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,2.3.1.1)
  • H
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

[,2.3.1.1)
  • H
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

[,2.3.1.1)
  • H
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

[,2.3.1.1)
  • H
NULL Pointer Dereference

[,2.3.1.2)
  • M
NULL Pointer Dereference

[,2.3.1.2)
  • M
Incorrect Calculation of Buffer Size

[,2.3.1.2)
  • M
Uncontrolled Recursion

[,2.3.1.2)
  • H
Heap-based Buffer Overflow

[,2.3.1.1)
  • H
Integer Overflow or Wraparound

[,2.3.1.2)
  • H
Heap-based Buffer Overflow

[,2.3.1.1)
  • M
NULL Pointer Dereference

[,2.3.1.2)
  • M
NULL Pointer Dereference

[,2.3.1.2)
  • M
Improper Input Validation

[,2.3.1.2)
  • M
NULL Pointer Dereference

[,2.3.1.2)
  • M
Heap-based Buffer Overflow

[,2.3.1.2)
  • H
Improper Input Validation

[,2.3.1.2)
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

[,2.3.1.2)
  • M
Division by zero

[,2.3.1.2)
  • M
NULL Pointer Dereference

[,2.3.1.2)
  • H
Improper Input Validation

[,2.3.1.1)
  • M
NULL Pointer Dereference

[,2.3.1.2)
  • M
Incorrect Check of Function Return Value

[,2.2.6)
  • H
Out-of-bounds Read

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
NULL Pointer Dereference

[,2.3.1.1)
  • H
Out-of-Bounds

[,2.2.6)
  • C
Out-of-bounds Read

[,2.2.6)
  • C
Buffer Overflow

[,2.2.6)