Debian Eog vulnerabilities
3 known vulnerabilities affecting debian/eog.
Total CVEs
3
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM1LOW1
Vulnerabilities
Page 1 of 1
CVE-2016-6855HIGHCVSS 7.5PoCfixed in eog 3.20.4-1 (bookworm)2016
CVE-2016-6855 [HIGH] CVE-2016-6855: eog - Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x ...
Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
Scope: local
bookworm: resolved (fixed in 3.20.4-1)
bullseye: resolved (fixed in 3.20.4-1)
forky: resolv
debian
CVE-2008-5987LOWCVSS 6.9fixed in eog 2.22.3-2 (bookworm)2008
CVE-2008-5987 [MEDIUM] CVE-2008-5987: eog - Untrusted search path vulnerability in the Python interface in Eye of GNOME (eog...
Untrusted search path vulnerability in the Python interface in Eye of GNOME (eog) 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
Scope: local
bookworm: resolved (fixed in 2.22.3-2)
bullseye: resolve
debian
CVE-2003-0165MEDIUMCVSS 4.6PoCfixed in eog 2.2.1 (bookworm)2003
CVE-2003-0165 [MEDIUM] CVE-2003-0165: eog - Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute ar...
Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute arbitrary code via format string specifiers in a command line argument for the file to display.
Scope: local
bookworm: resolved (fixed in 2.2.1)
bullseye: resolved (fixed in 2.2.1)
forky: resolved (fixed in 2.2.1)
sid: resolved (fixed in 2.2.1)
trixie: resolved (fixed in 2.2.1)
debian