Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1040 articles · 105207 vulns · 38/41 feeds (7d)
← Back to list
7.4
CVE-2026-32775EXPLOITED
azl3 · libexif

libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow.

Description

libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow.

Affected Products

VendorProductVersions
azl3libexif0.6.24-1

References

  • https://github.com/libexif/libexif/commit/7df372e9d31d7c993a22b913c813a5f7ec4f3692
  • https://github.com/libexif/libexif/issues/247

Related News (2 articles)

Tier B
CERT-FR4d ago
Multiples vulnérabilités dans les produits Microsoft (23 mars 2026)
→ No new info (linked only)
Tier A
Microsoft MSRC6d ago
CVE-2026-32775
→ No new info (linked only)
CVSS 3.17.4 HIGH
VectorCVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-191
Published3/16/2026
Last enriched2h agov3
Trending Score24
Source articles2
Independent2
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v3
Last enriched 2h ago
v3Tier B2h ago

Updated vendor to azl3, product to libexif, and marked the vulnerability as actively exploited with an exploit available.

vendorproductexploitAvailableactivelyExploited
via CERT-FR
v2Tier B9h ago

Updated affected versions to include 0.6.24-1, marked exploit as available, marked as actively exploited, and provided a patch available version 0.6.24-2.

affectedVersionspatchAvailable
via CERT-FR
v110h ago

Initial creation