Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-3355

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-17 Jul, 2012 | 21:00
Updated At-06 Aug, 2024 | 20:05
Rejected At-
Credits

(1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:17 Jul, 2012 | 21:00
Updated At:06 Aug, 2024 | 20:05
Rejected At:
▼CVE Numbering Authority (CNA)

(1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://bugzilla.gnome.org/show_bug.cgi?id=678661
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2012/06/25/5
mailing-list
x_refsource_MLIST
https://hermes.opensuse.org/messages/15351848
vendor-advisory
x_refsource_SUSE
http://www.openwall.com/lists/oss-security/2012/06/25/7
mailing-list
x_refsource_MLIST
http://www.securityfocus.com/bid/54186
vdb-entry
x_refsource_BID
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html
x_refsource_MISC
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
x_refsource_MISC
http://www.ubuntu.com/usn/USN-1503-1
vendor-advisory
x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/76538
vdb-entry
x_refsource_XF
https://bugzilla.redhat.com/show_bug.cgi?id=835076
x_refsource_MISC
Hyperlink: https://bugzilla.gnome.org/show_bug.cgi?id=678661
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/5
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://hermes.opensuse.org/messages/15351848
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/7
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.securityfocus.com/bid/54186
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html
Resource:
x_refsource_MISC
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
Resource:
x_refsource_MISC
Hyperlink: http://www.ubuntu.com/usn/USN-1503-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/76538
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=835076
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://bugzilla.gnome.org/show_bug.cgi?id=678661
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2012/06/25/5
mailing-list
x_refsource_MLIST
x_transferred
https://hermes.opensuse.org/messages/15351848
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.openwall.com/lists/oss-security/2012/06/25/7
mailing-list
x_refsource_MLIST
x_transferred
http://www.securityfocus.com/bid/54186
vdb-entry
x_refsource_BID
x_transferred
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html
x_refsource_MISC
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
x_refsource_MISC
x_transferred
http://www.ubuntu.com/usn/USN-1503-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/76538
vdb-entry
x_refsource_XF
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=835076
x_refsource_MISC
x_transferred
Hyperlink: https://bugzilla.gnome.org/show_bug.cgi?id=678661
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/5
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://hermes.opensuse.org/messages/15351848
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/7
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.securityfocus.com/bid/54186
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-1503-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/76538
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=835076
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:17 Jul, 2012 | 21:55
Updated At:11 Apr, 2025 | 00:51

(1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.03.6LOW
AV:L/AC:L/Au:N/C:N/I:P/A:P
Primary2.03.6LOW
AV:L/AC:L/Au:N/C:N/I:P/A:P
Type: Primary
Version: 2.0
Base score: 3.6
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P
Type: Primary
Version: 2.0
Base score: 3.6
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P
CPE Matches

The GNOME Project
gnome
>>rhythmbox>>Versions up to 0.13.3(inclusive)
cpe:2.3:a:gnome:rhythmbox:*:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.5.0
cpe:2.3:a:gnome:rhythmbox:0.5.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.5.1
cpe:2.3:a:gnome:rhythmbox:0.5.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.5.2
cpe:2.3:a:gnome:rhythmbox:0.5.2:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.5.3
cpe:2.3:a:gnome:rhythmbox:0.5.3:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.5.4
cpe:2.3:a:gnome:rhythmbox:0.5.4:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.5.88
cpe:2.3:a:gnome:rhythmbox:0.5.88:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.0
cpe:2.3:a:gnome:rhythmbox:0.6.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.1
cpe:2.3:a:gnome:rhythmbox:0.6.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.2
cpe:2.3:a:gnome:rhythmbox:0.6.2:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.3
cpe:2.3:a:gnome:rhythmbox:0.6.3:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.4
cpe:2.3:a:gnome:rhythmbox:0.6.4:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.5
cpe:2.3:a:gnome:rhythmbox:0.6.5:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.6
cpe:2.3:a:gnome:rhythmbox:0.6.6:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.7
cpe:2.3:a:gnome:rhythmbox:0.6.7:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.6.8
cpe:2.3:a:gnome:rhythmbox:0.6.8:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.7.0
cpe:2.3:a:gnome:rhythmbox:0.7.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.7.1
cpe:2.3:a:gnome:rhythmbox:0.7.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.7.2
cpe:2.3:a:gnome:rhythmbox:0.7.2:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.0
cpe:2.3:a:gnome:rhythmbox:0.8.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.1
cpe:2.3:a:gnome:rhythmbox:0.8.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.2
cpe:2.3:a:gnome:rhythmbox:0.8.2:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.3
cpe:2.3:a:gnome:rhythmbox:0.8.3:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.4
cpe:2.3:a:gnome:rhythmbox:0.8.4:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.5
cpe:2.3:a:gnome:rhythmbox:0.8.5:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.6
cpe:2.3:a:gnome:rhythmbox:0.8.6:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.7
cpe:2.3:a:gnome:rhythmbox:0.8.7:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.8.8
cpe:2.3:a:gnome:rhythmbox:0.8.8:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.0
cpe:2.3:a:gnome:rhythmbox:0.9.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.1
cpe:2.3:a:gnome:rhythmbox:0.9.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.2
cpe:2.3:a:gnome:rhythmbox:0.9.2:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.3
cpe:2.3:a:gnome:rhythmbox:0.9.3:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.3.1
cpe:2.3:a:gnome:rhythmbox:0.9.3.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.4
cpe:2.3:a:gnome:rhythmbox:0.9.4:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.4.1
cpe:2.3:a:gnome:rhythmbox:0.9.4.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.5
cpe:2.3:a:gnome:rhythmbox:0.9.5:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.6
cpe:2.3:a:gnome:rhythmbox:0.9.6:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.6.90
cpe:2.3:a:gnome:rhythmbox:0.9.6.90:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.7
cpe:2.3:a:gnome:rhythmbox:0.9.7:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.9.8
cpe:2.3:a:gnome:rhythmbox:0.9.8:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.10.0
cpe:2.3:a:gnome:rhythmbox:0.10.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.10.0.90
cpe:2.3:a:gnome:rhythmbox:0.10.0.90:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.10.1
cpe:2.3:a:gnome:rhythmbox:0.10.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.0
cpe:2.3:a:gnome:rhythmbox:0.11.0:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.1
cpe:2.3:a:gnome:rhythmbox:0.11.1:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.2
cpe:2.3:a:gnome:rhythmbox:0.11.2:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.3
cpe:2.3:a:gnome:rhythmbox:0.11.3:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.4
cpe:2.3:a:gnome:rhythmbox:0.11.4:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.5
cpe:2.3:a:gnome:rhythmbox:0.11.5:*:*:*:*:*:*:*
The GNOME Project
gnome
>>rhythmbox>>0.11.6
cpe:2.3:a:gnome:rhythmbox:0.11.6:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673secalert@redhat.com
N/A
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.htmlsecalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2012/06/25/5secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2012/06/25/7secalert@redhat.com
N/A
http://www.securityfocus.com/bid/54186secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-1503-1secalert@redhat.com
N/A
https://bugzilla.gnome.org/show_bug.cgi?id=678661secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=835076secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/76538secalert@redhat.com
N/A
https://hermes.opensuse.org/messages/15351848secalert@redhat.com
N/A
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673af854a3a-2127-422b-91ae-364da2661108
N/A
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2012/06/25/5af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2012/06/25/7af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/54186af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-1503-1af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.gnome.org/show_bug.cgi?id=678661af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=835076af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/76538af854a3a-2127-422b-91ae-364da2661108
N/A
https://hermes.opensuse.org/messages/15351848af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/5
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/7
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/54186
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1503-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.gnome.org/show_bug.cgi?id=678661
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=835076
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/76538
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://hermes.opensuse.org/messages/15351848
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/25/7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/54186
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-1503-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.gnome.org/show_bug.cgi?id=678661
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=835076
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/76538
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://hermes.opensuse.org/messages/15351848
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

8Records found

CVE-2021-20315
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 9.99%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 00:00
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.

Action-Not Available
Vendor-centosn/aThe GNOME Project
Product-gnome-shellstreamgnome-shell
CWE ID-CWE-667
Improper Locking
CVE-2010-4005
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.11% / 30.34%
||
7 Day CHG~0.00%
Published-05 Nov, 2010 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

Action-Not Available
Vendor-n/aThe GNOME Project
Product-tomboyn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-4035
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-2.45% / 84.59%
||
7 Day CHG~0.00%
Published-21 Dec, 2009 | 21:00
Updated-07 Aug, 2024 | 06:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.

Action-Not Available
Vendor-xpdfn/aThe GNOME ProjectKDE
Product-gpdfkpdfxpdfkdegraphicsn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-43091
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-9.8||CRITICAL
EPSS-0.53% / 66.44%
||
7 Day CHG-0.01%
Published-17 Nov, 2024 | 12:25
Updated-06 Aug, 2025 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gnome-maps: gnome maps is vulnerable to a code injection attack (similar to xss) via its service.json

A flaw was found in GNOME Maps, which is vulnerable to a code injection attack via its service.json configuration file. If the configuration file is malicious, it may execute arbitrary code.

Action-Not Available
Vendor-gnome_mapsThe GNOME Project
Product-gnome-mapsgnome_maps
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2012-4427
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-1.03% / 76.37%
||
7 Day CHG~0.00%
Published-01 Oct, 2012 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The gnome-shell plugin 3.4.1 in GNOME allows remote attackers to force the download and installation of arbitrary extensions from extensions.gnome.org via a crafted web page.

Action-Not Available
Vendor-n/aThe GNOME Project
Product-gnome-shelln/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-4056
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-0.05% / 15.56%
||
7 Day CHG~0.00%
Published-28 Jul, 2025 | 12:40
Updated-13 Aug, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glib: glib crash after long command line

A flaw was found in GLib. A denial of service on Windows platforms may occur if an application attempts to spawn a program using long command lines.

Action-Not Available
Vendor-Red Hat, Inc.The GNOME ProjectMicrosoft Corporation
Product-windowsglibRed Hat Enterprise Linux 8Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-10684
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.9||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 00:00
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora Project
Product-debian_linuxopenstackfedoraansibleansible_towerAnsible
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-33493
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6||MEDIUM
EPSS-0.20% / 42.43%
||
7 Day CHG~0.00%
Published-22 Nov, 2021 | 08:24
Updated-03 Aug, 2024 | 23:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The middleware component in OX App Suite through 7.10.5 allows Code Injection via Java classes in a YAML format.

Action-Not Available
Vendor-n/aOpen-Xchange AG
Product-ox_app_suiten/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
Details not found