Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome vulnerabilities and exploits
(subscribe to this query)
614
VMScore
CVE-2010-4005
The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and previous versions place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists...
Gnome Tomboy 1.5.1
Gnome Tomboy 1.4.2
Gnome Tomboy 1.2.2
Gnome Tomboy 1.0.1
Gnome Tomboy
409
VMScore
CVE-2008-4316
Multiple integer overflows in glib/gbase64.c in GLib prior to 2.20 allow context-dependent malicious users to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Gnome Glib 2.14.5
Gnome Glib
Gnome Glib 2.16.3
Gnome Glib 2.14.6
Gnome Glib 2.2.1
445
VMScore
CVE-2004-0753
The BMP image processor for (1) gdk-pixbuf prior to 0.22 and (2) gtk2 prior to 2.2.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted BMP file.
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk
445
VMScore
CVE-2004-0788
Integer overflow in the ICO image decoder for (1) gdk-pixbuf prior to 0.22 and (2) gtk2 prior to 2.2.4 allows remote malicious users to cause a denial of service (application crash) via a crafted ICO file.
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk
498
VMScore
CVE-2010-0285
gnome-screensaver 2.14.3, 2.22.2, 2.27.x, 2.28.0, and 2.28.3, when the X configuration enables the extend screen option, allows physically proximate malicious users to bypass screen locking, access an unattended workstation, and view half of the GNOME desktop by attaching an exte...
Gnome Screensaver 2.28.0
Gnome Screensaver 2.28.3
Gnome Screensaver 2.22.2
Gnome Screensaver 2.27
Gnome Screensaver 2.14.3
445
VMScore
CVE-2012-2370
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf prior to 2.26.1 allow remote malicious users to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overf...
Gnome Gdk-pixbuf 2.25.2
Gnome Gdk-pixbuf 2.25.0
Gnome Gdk-pixbuf 2.23.5
Gnome Gdk-pixbuf 2.24.1
Gnome Gdk-pixbuf 2.23.3
Gnome Gdk-pixbuf 2.23.4
Gnome Gdk-pixbuf 2.24.0
Gnome Gdk-pixbuf
187
VMScore
CVE-2003-0547
GDM prior to 2.4.1.6, when using the "examine session errors" feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file.
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.4.0.7.13
Redhat Kdebase 2.4.1.3.5
294
VMScore
CVE-2012-3452
gnome-screensaver 3.4.x prior to 3.4.4 and 3.5.x prior to 3.5.4, when multiple screens are used, only locks the screen with the active focus, which allows physically proximate malicious users to bypass screen locking and access an unattended workstation.
Gnome Screensaver 3.4.0
Gnome Screensaver 3.4.2
Gnome Screensaver 3.4.3
Gnome Screensaver 3.5.3
383
VMScore
CVE-2006-6105
Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.
Gnome Gdm 2.16
Gnome Gdm 2.16.1
Gnome Gdm 2.14.1
Gnome Gdm 2.16.2
329
VMScore
CVE-2006-2452
GNOME GDM 2.8, 2.12, 2.14, and 2.15, when the "face browser" feature is enabled, allows local users to access the "Configure Login Manager" functionality using their own password instead of the root password, which can be leveraged to gain additional privilege...
Gnome Gdm 2.14
Gnome Gdm 2.15
Gnome Gdm 2.12
Gnome Gdm 2.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »