Логотип exploitDog
bind:"CVE-2023-43641"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-43641"

Количество 7

Количество 7

ubuntu логотип

CVE-2023-43641

больше 1 года назад

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

CVSS3: 8.8
EPSS: Высокий
redhat логотип

CVE-2023-43641

больше 1 года назад

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

CVSS3: 8.8
EPSS: Высокий
nvd логотип

CVE-2023-43641

больше 1 года назад

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

CVSS3: 8.8
EPSS: Высокий
debian логотип

CVE-2023-43641

больше 1 года назад

libcue provides an API for parsing and extracting data from CUE sheets ...

CVSS3: 8.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2023:4090-1

больше 1 года назад

Security update for libcue

EPSS: Высокий
fstec логотип

BDU:2023-06566

больше 1 года назад

Уязвимость прикладного программного интерфейса библиотеки libcue, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Высокий
redos логотип

ROS-20240731-02

11 месяцев назад

Уязвимость libcue

CVSS3: 8.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-43641

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

CVSS3: 8.8
79%
Высокий
больше 1 года назад
redhat логотип
CVE-2023-43641

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

CVSS3: 8.8
79%
Высокий
больше 1 года назад
nvd логотип
CVE-2023-43641

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

CVSS3: 8.8
79%
Высокий
больше 1 года назад
debian логотип
CVE-2023-43641

libcue provides an API for parsing and extracting data from CUE sheets ...

CVSS3: 8.8
79%
Высокий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4090-1

Security update for libcue

79%
Высокий
больше 1 года назад
fstec логотип
BDU:2023-06566

Уязвимость прикладного программного интерфейса библиотеки libcue, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
79%
Высокий
больше 1 года назад
redos логотип
ROS-20240731-02

Уязвимость libcue

CVSS3: 8.8
79%
Высокий
11 месяцев назад

Уязвимостей на страницу