XnSoft NConvert 7.230 is vulnerable to Stack Buffer Overrun via a crafted .tiff file.
References
| Link | Resource |
|---|---|
| https://github.com/PassMoon/Nconvert_Vul | Exploit Third Party Advisory |
| https://www.xnview.com/en/nconvert/#downloads | Product |
Configurations
History
26 Mar 2026, 15:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Xnview
Xnview nconvert |
|
| CPE | cpe:2.3:a:xnview:nconvert:7.230:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/PassMoon/Nconvert_Vul - Exploit, Third Party Advisory | |
| References | () https://www.xnview.com/en/nconvert/#downloads - Product |
23 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 17:16
Updated : 2026-03-26 15:27
NVD link : CVE-2026-30006
Mitre link : CVE-2026-30006
CVE.ORG link : CVE-2026-30006
JSON object : View
Products Affected
xnview
- nconvert
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
