DEBIAN-CVE-2021-36048

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-36048
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-36048.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-36048
Upstream
Published
2021-09-01T15:15:10Z
Modified
2025-09-19T07:31:41.513658Z
Summary
[none]
Details

XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

References

Affected packages

Debian:11 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.2-1+deb11u1

Affected versions

2.*

2.5.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / exempi

Package

Name
exempi
Purl
pkg:deb/debian/exempi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}