Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0080
The iptables ruleset in Gnome-lokkit in Red Hat Linux 8.0 does not include any rules in the FORWARD chain, which could allow malicious users to bypass intended access restrictions if packet forwarding is enabled.
Gnome Gnome-lokkit 0.50 21
6.8
CVSSv2
CVE-2012-4427
The gnome-shell plugin 3.4.1 in GNOME allows remote malicious users to force the download and installation of arbitrary extensions from extensions.gnome.org via a crafted web page.
Gnome Gnome-shell 3.4.1
6.2
CVSSv2
CVE-2010-0732
gdk/gdkwindow.c in GTK+ prior to 2.18.5, as used in gnome-screensaver prior to 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate malicious users to bypass screen ...
Gnome Gtk
Gnome Screensaver
4.4
CVSSv2
CVE-2020-27837
A flaw was found in GDM in versions before 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requ...
Gnome Gnome Display Manager
6.9
CVSSv2
CVE-2010-4000
gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Gnome Gnome-shell 2.31.5
4.6
CVSSv2
CVE-2018-14424
The daemon in GDM up to and including 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local malicious user to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial ...
Gnome Gnome Display Manager
7.5
CVSSv2
CVE-2012-0828
Heap-based buffer overflow in Xchat-WDK prior to 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote malicious users to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the ...
Gnome Gtk 2.10.4
Gnome Gtk 2.14.7
Gnome Gtk 2.18.9
Gnome Gtk 2.24.7
Xchat Xchat
Xchat-wdk Xchat-wdk
6.2
CVSSv2
CVE-2000-0722
Helix GNOME Updater helix-update 0.5 and previous versions allows local users to install arbitrary RPM packages by creating the /tmp/helix-install installation directory before root has begun installing packages.
Helix Code Gnome Updater 0.4
Helix Code Gnome Updater 0.3
Helix Code Gnome Updater 0.1
Helix Code Gnome Updater 0.2
Helix Code Gnome Updater 0.5
5
CVSSv2
CVE-2003-0549
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) via a short authorization key name.
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Redhat Kdebase 2.2.3.1.22
Redhat Kdebase 2.4.0.7.13
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Redhat Kdebase 2.2.3.1.20
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
5
CVSSv2
CVE-2003-0548
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Redhat Kdebase 2.2.3.1.20
Redhat Kdebase 2.2.3.1.22
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Redhat Kdebase 2.4.0.7.13
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »