Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome gtk vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4831
Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ prior to 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.
Gnome Gtk
NA
CVE-2010-4833
Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ prior to 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.
Gnome Gtk
NA
CVE-2001-0084
GTK+ library allows local users to specify arbitrary modules via the GTK_MODULES environmental variable, which could allow local users to gain privileges if GTK+ is used by a setuid/setgid program.
Gnome Gtk 1.2.8
1 EDB exploit
9.8
CVSSv3
CVE-2017-1000044
gtk-vnc 0.4.2 and older doesn't check framebuffer boundaries correctly when updating framebuffer which may lead to memory corruption when rendering
Gnome Gtk-vnc 0.4.2
NA
CVE-2004-0753
The BMP image processor for (1) gdk-pixbuf prior to 0.22 and (2) gtk2 prior to 2.2.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted BMP file.
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk
NA
CVE-2004-0788
Integer overflow in the ICO image decoder for (1) gdk-pixbuf prior to 0.22 and (2) gtk2 prior to 2.2.4 allows remote malicious users to cause a denial of service (application crash) via a crafted ICO file.
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk
NA
CVE-2014-1949
GTK+ 3.10.9 and previous versions, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate malicious users to bypass the lock screen by pressing the menu button.
Linuxmint Linux Mint 17.0
Gnome Gtk
Canonical Ubuntu 14.04
6.5
CVSSv3
CVE-2013-7447
Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ prior to 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote malicious users to cause a denial of service (crash) via a large ima...
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Gtk Gtk\\\\\\+
NA
CVE-2011-3635
Cross-site scripting (XSS) vulnerability in the theme_adium_append_message function in empathy-theme-adium.c in the Adium theme in libempathy-gtk in Empathy 3.2.1 and previous versions allows remote malicious users to inject arbitrary web script or HTML via a crafted alias (aka n...
Gnome Empathy 3.1.1
Gnome Empathy 3.1.2.1
Gnome Empathy 3.1.90
Gnome Empathy 3.1.91
Gnome Empathy 2.91.3
Gnome Empathy 2.91.4
Gnome Empathy 2.91.6.1
Gnome Empathy 2.91.6
Gnome Empathy 2.91.93
Gnome Empathy 3.1.4
Gnome Empathy 3.1.5
Gnome Empathy 3.0.2
Gnome Empathy 2.91.0
Gnome Empathy 2.91.4.2
Gnome Empathy 2.91.4.3
Gnome Empathy 2.91.90
Gnome Empathy 2.91.91.1
Gnome Empathy 2.33.3
Gnome Empathy 2.32.0.1
Gnome Empathy 2.31.4
Gnome Empathy 2.31.5.1
Gnome Empathy 2.30.0.2
NA
CVE-2011-4170
Cross-site scripting (XSS) vulnerability in the theme_adium_append_message function in empathy-theme-adium.c in the Adium theme in libempathy-gtk in Empathy 3.2.1 and previous versions allows remote malicious users to inject arbitrary web script or HTML via a crafted alias (aka n...
Gnome Empathy 3.1.3
Gnome Empathy 3.1.4
Gnome Empathy 3.1.5
Gnome Empathy 3.1.5.1
Gnome Empathy 2.91.3.1
Gnome Empathy 2.91.4.1
Gnome Empathy 2.91.4.2
Gnome Empathy 2.91.4.3
Gnome Empathy 2.33.1
Gnome Empathy 2.33.2
Gnome Empathy 2.33.3
Gnome Empathy 2.32.0.1
Gnome Empathy 2.30.0.1
Gnome Empathy 2.30.0.2
Gnome Empathy 2.30.0
Gnome Empathy 2.30.1.1
Gnome Empathy 2.29.91.2
Gnome Empathy 2.29.91
Gnome Empathy 2.29.92
Gnome Empathy 2.29.93
Gnome Empathy 2.28.0.1
Gnome Empathy 2.27.92
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »