jhead_project CVE Vulnerabilities & Metrics

Focus on jhead_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About jhead_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with jhead_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total jhead_project CVEs: 17
Earliest CVE date: 04 Feb 2018, 15:29 UTC
Latest CVE date: 13 Jun 2023, 20:15 UTC

Latest CVE reference: CVE-2022-28550

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical jhead_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.58

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 14
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS jhead_project CVEs

These are the five CVEs with the highest CVSS scores for jhead_project, sorted by severity first and recency.

All CVEs for jhead_project

CVE-2022-28550 jhead_project vulnerability CVSS: 0 13 Jun 2023, 20:15 UTC

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.

CVE-2021-34055 jhead_project vulnerability CVSS: 0 04 Nov 2022, 17:15 UTC

jhead 3.06 is vulnerable to Buffer Overflow via exif.c in function Put16u.

CVE-2022-41751 jhead_project vulnerability CVSS: 0 17 Oct 2022, 18:15 UTC

Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option.

CVE-2021-28278 jhead_project vulnerability CVSS: 6.8 23 Mar 2022, 21:15 UTC

A Heap-based Buffer Overflow vulnerability exists in jhead 3.04 and 3.05 via the RemoveSectionType function in jpgfile.c.

CVE-2021-28277 jhead_project vulnerability CVSS: 6.8 23 Mar 2022, 21:15 UTC

A Heap-based Buffer Overflow vulnerabilty exists in jhead 3.04 and 3.05 is affected by: Buffer Overflow via the RemoveUnknownSections function in jpgfile.c.

CVE-2021-28276 jhead_project vulnerability CVSS: 5.0 23 Mar 2022, 21:15 UTC

A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a wild address read in the ProcessCanonMakerNoteDir function in makernote.c.

CVE-2021-28275 jhead_project vulnerability CVSS: 4.3 23 Mar 2022, 21:15 UTC

A Denial of Service vulnerability exists in jhead 3.04 and 3.05 due to a wild address read in the Get16u function in exif.c in will cause segmentation fault via a crafted_file.

CVE-2020-26208 jhead_project vulnerability CVSS: 5.8 02 Feb 2022, 12:15 UTC

JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.

CVE-2021-3496 jhead_project vulnerability CVSS: 6.8 22 Apr 2021, 19:15 UTC

A heap-based buffer overflow was found in jhead in version 3.06 in Get16u() in exif.c when processing a crafted file.

CVE-2020-6625 jhead_project vulnerability CVSS: 5.8 09 Jan 2020, 01:15 UTC

jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c.

CVE-2020-6624 jhead_project vulnerability CVSS: 5.8 09 Jan 2020, 01:15 UTC

jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c.

CVE-2019-19035 jhead_project vulnerability CVSS: 4.3 17 Nov 2019, 18:15 UTC

jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.

CVE-2019-1010302 jhead_project vulnerability CVSS: 4.3 15 Jul 2019, 18:15 UTC

jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.

CVE-2019-1010301 jhead_project vulnerability CVSS: 4.3 15 Jul 2019, 18:15 UTC

jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.

CVE-2018-17088 jhead_project vulnerability CVSS: 6.8 16 Sep 2018, 17:29 UTC

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because there is an integer overflow during a check for whether a location exceeds the EXIF data length. This is analogous to the CVE-2016-3822 integer overflow in exif.c. This gpsinfo.c vulnerability is unrelated to the CVE-2018-16554 gpsinfo.c vulnerability.

CVE-2018-16554 jhead_project vulnerability CVSS: 6.8 16 Sep 2018, 02:29 UTC

The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may allow a remote attacker to cause a denial-of-service attack or unspecified other impact via a malicious JPEG file, because of inconsistency between float and double in a sprintf format string during TAG_GPS_ALT handling.

CVE-2018-6612 jhead_project vulnerability CVSS: 4.3 04 Feb 2018, 15:29 UTC

An integer underflow bug in the process_EXIF function of the exif.c file of jhead 3.00 raises a heap-based buffer over-read when processing a malicious JPEG file, which may allow a remote attacker to cause a denial-of-service attack or unspecified other impact.