Vulnerabilities > Lilypond

DATE CVE VULNERABILITY TITLE RISK
2023-04-15 CVE-2020-17354 Incorrect Authorization vulnerability in Lilypond
LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format.
local
low complexity
lilypond CWE-863
8.6
2020-08-05 CVE-2020-17353 scm/define-stencil-commands.scm in LilyPond through 2.20.0, and 2.21.x through 2.21.4, when -dsafe is used, lacks restrictions on embedded-ps and embedded-svg, as demonstrated by including dangerous PostScript code.
network
low complexity
lilypond fedoraproject debian opensuse
critical
9.8
2018-05-11 CVE-2018-10992 Argument Injection or Modification vulnerability in Lilypond 2.19.80
lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure.
network
low complexity
lilypond CWE-88
critical
9.8
2017-12-11 CVE-2017-17523 Injection vulnerability in Lilypond 2.19.80
lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.
network
low complexity
lilypond CWE-74
8.8