Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome vulnerabilities and exploits
(subscribe to this query)
465
VMScore
CVE-2003-0165
Format string vulnerability in Eye Of Gnome (EOG) allows malicious users to execute arbitrary code via format string specifiers in a command line argument for the file to display.
Gnome Eog 1.0.0
Gnome Eog 1.1.3
Gnome Eog 1.1.4
Gnome Eog 1.0.1
Gnome Eog 1.0.2
Gnome Eog 2.2.0
Gnome Eog 1.1.1
Gnome Eog 1.1.2
Gnome Eog 1.0.3
Gnome Eog 1.0.4
1 EDB exploit
668
VMScore
CVE-2005-2549
Multiple format string vulnerabilities in Evolution 1.5 up to and including 2.3.6.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from...
Gnome Evolution 2.0
Gnome Evolution 2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 1.5
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
187
VMScore
CVE-2003-0794
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows malicious users to cause a denial of service (resource exhaustion) by sending commands and not reading the results.
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
187
VMScore
CVE-2003-0793
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not restrict the size of input, which allows malicious users to cause a denial of service (memory consumption).
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
668
VMScore
CVE-2004-0782
Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, allows remote malicious users to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overf...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
668
VMScore
CVE-2004-0783
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, may allow remote malicious users to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
505
VMScore
CVE-2006-0528
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote malicious users to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very lon...
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.7
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
1 EDB exploit
231
VMScore
CVE-2006-2789
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote malicious users to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-ad...
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
Gnome Evolution 2.3.1
Gnome Evolution 2.3.3
Gnome Evolution 2.3.7
Gnome Evolution 2.3.2
392
VMScore
CVE-2012-3466
GNOME gnome-keyring 3.4.0 up to and including 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows malicious users to have an unspecified impact via unknown attack vectors.
Gnome Gnome-keyring 3.4.1
Gnome Gnome-keyring 3.4.0
641
VMScore
CVE-2010-0414
gnome-screensaver prior to 2.28.2 allows physically proximate malicious users to bypass screen locking and access an unattended workstation by moving the mouse position to an external monitor and then disconnecting that monitor.
Gnome Screensaver 2.20.0
Gnome Screensaver 2.20
Gnome Screensaver 2.28.0
Gnome Screensaver 2.26.1
Gnome Screensaver 2.13
Gnome Screensaver
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »