Libtiff

8 CVEs product

Monthly

CVE-2025-61145 MEDIUM POC PATCH This Month

libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c. [CVSS 5.0 MEDIUM]

Information Disclosure Libtiff Redhat Suse
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-61144 HIGH POC PATCH This Week

libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. [CVSS 7.3 HIGH]

Stack Overflow Libtiff Redhat Suse
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-61143 MEDIUM PATCH This Month

libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. [CVSS 5.5 MEDIUM]

Null Pointer Dereference Libtiff Redhat Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-9165 LOW POC PATCH Monitor

A flaw has been found in LibTIFF 4.7.0. Rated low severity (CVSS 2.0). Public exploit code available.

Information Disclosure Libtiff
NVD VulDB
CVSS 4.0
2.0
EPSS
0.0%
CVE-2025-8961 MEDIUM POC PATCH Monitor

A weakness has been identified in LibTIFF 4.7.0. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Buffer Overflow Libtiff Redhat Suse
NVD VulDB
CVSS 4.0
4.8
EPSS
0.0%
CVE-2025-8851 MEDIUM PATCH Monitor

A vulnerability was determined in LibTIFF up to 4.5.1. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. This Buffer Overflow vulnerability could allow attackers to corrupt memory to execute arbitrary code or crash the application.

Buffer Overflow Libtiff Redhat Suse
NVD VulDB
CVSS 4.0
4.8
EPSS
0.0%
CVE-2025-8534 LOW POC PATCH Monitor

A vulnerability classified as problematic was found in libtiff 4.6.0. Rated low severity (CVSS 2.0). Public exploit code available.

Denial Of Service Libtiff
NVD VulDB
CVSS 4.0
2.0
EPSS
0.0%
CVE-2024-13978 LOW POC PATCH Monitor

A vulnerability was found in LibTIFF up to 4.7.0. Rated low severity (CVSS 2.0). Public exploit code available.

Denial Of Service Libtiff
NVD VulDB
CVSS 4.0
2.0
EPSS
0.0%
CVE-2025-61145
EPSS 0% CVSS 5.0
MEDIUM POC PATCH This Month

libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c. [CVSS 5.0 MEDIUM]

Information Disclosure Libtiff Redhat +1
NVD GitHub
CVE-2025-61144
EPSS 0% CVSS 7.3
HIGH POC PATCH This Week

libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. [CVSS 7.3 HIGH]

Stack Overflow Libtiff Redhat +1
NVD GitHub
CVE-2025-61143
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. [CVSS 5.5 MEDIUM]

Null Pointer Dereference Libtiff Redhat +1
NVD GitHub
CVE-2025-9165
EPSS 0% CVSS 2.0
LOW POC PATCH Monitor

A flaw has been found in LibTIFF 4.7.0. Rated low severity (CVSS 2.0). Public exploit code available.

Information Disclosure Libtiff
NVD VulDB
CVE-2025-8961
EPSS 0% CVSS 4.8
MEDIUM POC PATCH Monitor

A weakness has been identified in LibTIFF 4.7.0. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Buffer Overflow Libtiff Redhat +1
NVD VulDB
CVE-2025-8851
EPSS 0% CVSS 4.8
MEDIUM PATCH Monitor

A vulnerability was determined in LibTIFF up to 4.5.1. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. This Buffer Overflow vulnerability could allow attackers to corrupt memory to execute arbitrary code or crash the application.

Buffer Overflow Libtiff Redhat +1
NVD VulDB
CVE-2025-8534
EPSS 0% CVSS 2.0
LOW POC PATCH Monitor

A vulnerability classified as problematic was found in libtiff 4.6.0. Rated low severity (CVSS 2.0). Public exploit code available.

Denial Of Service Libtiff
NVD VulDB
CVE-2024-13978
EPSS 0% CVSS 2.0
LOW POC PATCH Monitor

A vulnerability was found in LibTIFF up to 4.7.0. Rated low severity (CVSS 2.0). Public exploit code available.

Denial Of Service Libtiff
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy