Color Security Vulnerabilities (CVEs)
Track 57 security vulnerabilities affecting Color products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
A heap buffer overflow vulnerability in iccDEV library's CIccTagLut16::Validate() function allows attackers to execute arbitrary code or cause denial ...
Jan 6, 2026A buffer overflow vulnerability in iccDEV's CIccTagTextDescription function allows attackers to execute arbitrary code or crash applications by proces...
Jan 6, 2026This vulnerability involves integer overflow/underflow in the CIccXmlArrayType::ParseTextCountNum() function of iccDEV library, which could allow memo...
Jan 6, 2026CVE-2026-21674 is a memory leak vulnerability in iccDEV's XML parsing functionality (iccFromXml) that allows attackers to cause gradual memory exhaust...
Jan 6, 2026CVE-2026-21675 is a use-after-free vulnerability in iccDEV's CIccXform::Create() function that can lead to arbitrary code execution. This affects appl...
Jan 6, 2026CVE-2026-21507 is an infinite loop vulnerability in the CalcProfileID function of iccDEV's IccProfile.cpp. This allows attackers to cause denial of se...
Jan 6, 2026CVE-2023-46602 is a stack-based buffer overflow vulnerability in the icFixXml function of International Color Consortium's DemoIccMAX library. This al...
Oct 23, 2023Why Monitor Color Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 57+ known vulnerabilities affecting Color products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Color packages in under 60 seconds. No agents required - completely agentless scanning that works across Color deployments.
Free vulnerability database: Access detailed information about every Color CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Color CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions