Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. OpenImageIO
  4. oiio
  5. 2.4.8.0

Known Vulnerabilities in oiio 2.4.8.0

Show more ↓
3.0.1.0
3.0.0.3
2.5.17.0
2.5.16.0
2.5.15.0
2.5.14.0
2.5.13.1
2.5.13.0
2.5.12.0
2.5.11.0
2.5.10.1
2.5.10.0
2.5.9.0
2.5.8.0
2.5.7.0
2.5.6.0
2.5.5.0
2.5.4.0
2.4.17.0
2.4.16.0
2.4.15.0
2.4.14.0
2.4.13.0
2.4.12.0
2.4.11.1
2.4.11.0
2.4.10.0
2.4.9.0
2.4.8.1
2.4.8.0
2.4.7.1
2.4.7.0
2.4.6.1
2.4.6.0
2.4.5.0
2.4.4.2
2.4.4.1
2.3.21.0
2.3.20.0
2.3.19.0
2.3.18.0
2.3.17.0
2.3.16.0
2.3.15.0
2.3.14.0
2.3.13.0
2.3.12.0
2.3.11.0
2.3.10.1
2.3.10.0
2.3.9.1
2.3.8.0
2.3.7.2
2.2.21.0
2.2.20.0
2.2.19.0
2.2.18.0
2.2.17.0
2.2.16.0
2.2.15.1
2.2.15.0
2.2.14.0
2.2.13.1
2.2.13.0
2.2.12.0
2.2.11.1
2.2.11.0
2.2.10.1
2.2.10.0
2.2.9.0
2.2.8.0
2.2.7.0
2.2.6.1
2.1.20.0
2.1.18.1
2.0.14
1.8.15
1.8.13
1.8.12
1.8.9
1.7.14
1.6.14



Multiple vulnerabilities in OpenImageIO oiio10 Aug, 2023
High Patched
Information disclosure in OpenImageIO TIFF parsing11 Apr, 2023
Low Patched
Remote code execution OpenImageIO Exif parsing11 Apr, 2023
High Patched
Multiple vulnerabilities in OpenImageIO oiio04 Apr, 2023
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • European Commission launches an alternative to popular DNS services
  • Scattered Spider cybercrime gang shifts from SIM-swapping to more advanced techniques
  • OpenAI bans accounts linked to Russian and Chinese threat actors exploiting ChatGPT for cyber ops
  • Qilin exploits Fortinet flaws in new ransomware campaign
  • Cyber Security Week in Review: June 6, 2025
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.