Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
inkscape inkscape 0.41 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3737
Buffer overflow in the SVG importer (style.cpp) of inkscape 0.41 up to and including 0.42.2 might allow remote malicious users to execute arbitrary code via a SVG file with long CSS style property values.
Inkscape Inkscape 0.42.2
Inkscape Inkscape 0.41
Inkscape Inkscape 0.42
Inkscape Inkscape 0.42.1
1 EDB exploit
NA
CVE-2007-1463
Format string vulnerability in Inkscape prior to 0.45.1 allows user-assisted remote malicious users to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
Inkscape Inkscape 0.44
Inkscape Inkscape 0.40
Inkscape Inkscape 0.41
Inkscape Inkscape 0.42.2
Inkscape Inkscape 0.43
Inkscape Inkscape 0.42
Inkscape Inkscape 0.42.1
NA
CVE-2005-3885
The ps2epsi extension shell script (ps2epsi.sh) in Inkscape prior to 0.41 allows local users to overwrite arbitrary files via a symlink attack on the tmpepsifile.epsi temporary file.
Inkscape Inkscape 0.41
NA
CVE-2012-6076
Inkscape prior to 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts.
Inkscape Inkscape
Inkscape Inkscape 0.48
Inkscape Inkscape 0.48.3
Inkscape Inkscape 0.44
Inkscape Inkscape 0.43
Inkscape Inkscape 0.42
Inkscape Inkscape 0.42.2
Inkscape Inkscape 0.47
Inkscape Inkscape 0.48.2
Inkscape Inkscape 0.46
Inkscape Inkscape 0.44.1
Inkscape Inkscape 0.41
Inkscape Inkscape 0.39
Inkscape Inkscape 0.38.1
Inkscape Inkscape 0.48.1
Inkscape Inkscape 0.45.1
Inkscape Inkscape 0.40
Inkscape Inkscape 0.37
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2024-34413
CVE-2024-34089
CVE-2024-33408
local
SQL
CVE-2024-0402
CVE-2024-33910
CVE-2024-31848
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started