[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:10577
Inkscape (32-bit) is installed

oval:org.secpod.oval:def:46076
The host is installed with Inkscape before 0.45.1 and is prone to a format string vulnerability. A flaw is present in the application, which fails to properly handle format string specifiers in a URI. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:46077
The host is installed with Inkscape before 0.45.1 and is prone to a format string vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

oval:org.secpod.oval:def:46078
The host is installed with Inkscape before 0.41.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle symlink attack on the tmpepsifile.epsi temporary file. Successful exploitation could allow attackers to cause a denial of servi ...

oval:org.secpod.oval:def:46079
The host is installed with Inkscape 0.41.0 through 0.42.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the SVG importer (style.cpp) issue. Successful exploitation could allow remote attackers to execute arbitrary code via a SVG ...

oval:org.secpod.oval:def:46075
The host is installed with Inkscape before 0.48.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which might cause Inkscape to process unintended files. Successful exploitation could allow attackers to obtain sensitive information.

oval:org.secpod.oval:def:10578
The host is installed with Inkscape before 0.48.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which might cause Inkscape to process unintended files. Successful exploitation could allow attackers to obtain sensitive information.

*CPE
cpe:/a:inkscape:inkscape:::x86

© SecPod Technologies