Show filters
32 Total Results
Displaying 1-10 of 32
Sort by:
Attacker Value
Unknown
CVE-2024-25450
Disclosure Date: February 09, 2024 (last updated February 15, 2024)
imlib2 v1.9.1 was discovered to mishandle memory allocation in the function init_imlib_fonts().
0
Attacker Value
Unknown
CVE-2024-25448
Disclosure Date: February 09, 2024 (last updated February 15, 2024)
An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
0
Attacker Value
Unknown
CVE-2024-25447
Disclosure Date: February 09, 2024 (last updated February 15, 2024)
An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
0
Attacker Value
Unknown
CVE-2022-37706
Disclosure Date: December 25, 2022 (last updated October 08, 2023)
enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.
0
Attacker Value
Unknown
CVE-2020-12761
Disclosure Date: May 09, 2020 (last updated February 21, 2025)
modules/loaders/loader_ico.c in imlib2 1.6.0 has an integer overflow (with resultant invalid memory allocations and out-of-bounds reads) via an icon with many colors in its color map.
0
Attacker Value
Unknown
CVE-2018-20167
Disclosure Date: December 17, 2018 (last updated November 27, 2024)
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME types (/usr/share/applications). The control sequence defers unknown file types to the handle_unknown_media() function, which executes xdg-open against the filename specified in the sequence. The use of xdg-open for all unknown file types allows executable file formats with a registered shared MIME type to be executed. An attacker can achieve remote code execution by introducing an executable file and a plain text file containing the control sequence through a fake software project (e.g., in Git or a tarball). When the control sequence is rendered (such as with cat), the executable file will be run.
0
Attacker Value
Unknown
CVE-2014-1845
Disclosure Date: April 27, 2018 (last updated November 26, 2024)
An unspecified setuid root helper in Enlightenment before 0.17.6 allows local users to gain privileges by leveraging failure to properly sanitize the environment.
0
Attacker Value
Unknown
CVE-2014-1846
Disclosure Date: April 27, 2018 (last updated November 26, 2024)
Enlightenment before 0.17.6 might allow local users to gain privileges via vectors involving the gdb method.
0
Attacker Value
Unknown
CVE-2015-8971
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
Terminology 0.7.0 allows remote attackers to execute arbitrary commands via escape sequences that modify the window title and then are written to the terminal, a similar issue to CVE-2003-0063.
0
Attacker Value
Unknown
CVE-2016-3994
Disclosure Date: May 13, 2016 (last updated November 25, 2024)
The GIF loader in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (application crash) or obtain sensitive information via a crafted image, which triggers an out-of-bounds read.
0