Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome gdm 2.4.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2003-0793
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not restrict the size of input, which allows malicious users to cause a denial of service (memory consumption).
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
2.1
CVSSv2
CVE-2003-0794
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows malicious users to cause a denial of service (resource exhaustion) by sending commands and not reading the results.
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
2.1
CVSSv2
CVE-2003-0547
GDM prior to 2.4.1.6, when using the "examine session errors" feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file.
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.4.0.7.13
Redhat Kdebase 2.4.1.3.5
5
CVSSv2
CVE-2003-0548
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Redhat Kdebase 2.2.3.1.20
Redhat Kdebase 2.2.3.1.22
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Redhat Kdebase 2.4.0.7.13
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
5
CVSSv2
CVE-2003-0549
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) via a short authorization key name.
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Redhat Kdebase 2.2.3.1.22
Redhat Kdebase 2.4.0.7.13
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Redhat Kdebase 2.2.3.1.20
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started