By Risk Score
By Publish Date
By Recent Activity
gnome vulnerabilities and exploits
The gpg_ctx_add_recipient function in camel/camel-gpg-context.c in GNOME Evolution 3.8.4 and earlier and Evolution Data Server 3.9.5 and earlier does not properly select the GPG key to use for email encryption, which might cause the email to be encrypted with the wrong key and...
Evolution Data Server
Enterprise Linux Desktop
Enterprise Linux Server
Enterprise Linux Workstation
In xml.rs in GNOME librsvg before 2.46.2, a crafted SVG file with nested patterns can cause denial of service when passed to the library for processing. The attacker constructs pattern elements so that the number of final rendered objects grows exponentially....
NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used....
Linux Enterprise Desktop
Linux Enterprise Server
Innovative Interfaces Sierra Library Services Platform 1.2_3 does not properly handle query strings with multiple instances of the same parameter, which allows remote attackers to bypass parameter validation via unspecified vectors, possibly related to the Webpac Pro submodule....
GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending...
gksu-polkit-0.0.3-6.fc18 was reported as fixing the issue in CVE-2012-5617 but the patch was improperly applied and it did not fixed the security issue....
In NetworkManager 0.9.2.0, when a new wireless network was created with WPA/WPA2 security in AdHoc mode, it created an open/insecure network....
gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function...
Orca has arbitrary code execution due to insecure Python module load...