
Cloud Vulnerability DB
A community-led vulnerabilities database
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000002cba. This vulnerability affects the Plugin Formats.dll version 4.54.4 when reading DCR files (IrfanView Plugins).
The vulnerability is classified as a user-mode write access violation that occurs at the memory location FORMATS!ShowPlugInSaveOptions_W+0x2cba, specifically at address 1000e64a where there is an attempt to execute the instruction 'mov word ptr [edx+ecx*2],ax' targeting memory address 0b091000 (Research).
The vulnerability can lead to user mode write access violations when processing DCR files, potentially causing application crashes or instability (Research).
The vendor has fixed this issue in an updated version of the plugin. Users should update to the latest version of IrfanView and its plugins to mitigate this vulnerability (IrfanView Plugins).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."