{"id":"DEBIAN-CVE-2014-9622","details":"Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.","modified":"2025-11-19T01:12:37.436927Z","published":"2015-01-21T18:59:08.170Z","upstream":["CVE-2014-9622"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2014-9622"}],"affected":[{"package":{"name":"xdg-utils","ecosystem":"Debian:11","purl":"pkg:deb/debian/xdg-utils?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0~rc1+git20111210-7.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-9622.json"}},{"package":{"name":"xdg-utils","ecosystem":"Debian:12","purl":"pkg:deb/debian/xdg-utils?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0~rc1+git20111210-7.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-9622.json"}},{"package":{"name":"xdg-utils","ecosystem":"Debian:13","purl":"pkg:deb/debian/xdg-utils?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0~rc1+git20111210-7.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-9622.json"}},{"package":{"name":"xdg-utils","ecosystem":"Debian:14","purl":"pkg:deb/debian/xdg-utils?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0~rc1+git20111210-7.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2014-9622.json"}}],"schema_version":"1.7.3"}