The Python SVG import plugin (diasvg_import.py) for DIA 0.94 and earlier allows user-assisted attackers to execute arbitrary commands via a crafted SVG file.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/17059 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/17047 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/17095 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.debian.org/security/2005/dsa-847 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.vupen.com/english/advisories/2005/1950 | vdb-entry x_refsource_VUPEN x_transferred |
| http://www.gentoo.org/security/en/glsa/glsa-200510-06.xml | vendor-advisory x_refsource_GENTOO x_transferred |
| http://www.debian.org/security/2006/dsa-1025 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.securityfocus.com/bid/15000 | vdb-entry x_refsource_BID x_transferred |
| http://secunia.com/advisories/17083 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.mandriva.com/security/advisories?name=MDKSA-2005:187 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| http://www.novell.com/linux/security/advisories/2005_22_sr.html | vendor-advisory x_refsource_SUSE x_transferred |
| https://usn.ubuntu.com/193-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://secunia.com/advisories/17108 | third-party-advisory x_refsource_SECUNIA x_transferred |