Xdg Utils FreeDesktop Xdg Utils

Do you want an email whenever new security vulnerabilities are reported in FreeDesktop Xdg Utils?

By the Year

In 2024 there have been 0 vulnerabilities in FreeDesktop Xdg Utils . Xdg Utils did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 1 7.40
2021 2 7.65
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Xdg Utils vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent FreeDesktop Xdg Utils Security Vulnerabilities

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird

CVE-2022-4055 7.4 - High - November 19, 2022

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.

Improper Neutralization of Expression/Command Delimiters

The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which

CVE-2015-1877 8.8 - High - June 02, 2021

The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file.

Command Injection

A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer

CVE-2020-27748 6.5 - Medium - June 01, 2021

A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.

Insertion of Sensitive Information Into Sent Data

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for FreeDesktop Xdg Utils or by FreeDesktop? Click the Watch button to subscribe.

FreeDesktop
Vendor

subscribe