Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-j9yn-735h-mqds
Vulnerability ID VCID-j9yn-735h-mqds
Aliases CVE-2005-4803
Summary graphviz before 2.2.1 allows local users to overwrite arbitrary files via a symlink attack on temporary files. NOTE: this issue was originally associated with a different CVE identifier, CVE-2005-2965, which had been used for multiple different issues. This is the correct identifier.
Status Published
Exploitability 0.5
Weighted Severity 3.2
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2005-4803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4803
http://secunia.com/advisories/17121
http://secunia.com/advisories/17125
http://secunia.com/advisories/17207
http://www.debian.org/security/2005/dsa-857
http://www.mandriva.com/security/advisories?name=MDKSA-2005:188
http://www.securityfocus.com/bid/15050
336985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=336985
cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.10_2003-09-15_0415_2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.12.3:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.14.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.16.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.16.2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5_0.3:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.3:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.4:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.5:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.6:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.7.5.7:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.1:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.5.2:*:*:*:*:*:*:*
cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:graphviz:graphviz:1.8.9.1:*:*:*:*:*:*:*
CVE-2005-4803 https://nvd.nist.gov/vuln/detail/CVE-2005-4803
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2005-4803
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.19763
EPSS Score 0.00063
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T16:30:08.470274+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.0.0