Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2020-16125
gdm3 versions prior to 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to cr...
Gnome Gnome Display Manager
1 Github repository
552
VMScore
CVE-2010-0732
gdk/gdkwindow.c in GTK+ prior to 2.18.5, as used in gnome-screensaver prior to 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate malicious users to bypass screen ...
Gnome Gtk
Gnome Screensaver
605
VMScore
CVE-2012-4427
The gnome-shell plugin 3.4.1 in GNOME allows remote malicious users to force the download and installation of arbitrary extensions from extensions.gnome.org via a crafted web page.
Gnome Gnome-shell 3.4.1
614
VMScore
CVE-2010-4000
gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Gnome Gnome-shell 2.31.5
409
VMScore
CVE-2018-14424
The daemon in GDM up to and including 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local malicious user to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial ...
Gnome Gnome Display Manager
694
VMScore
CVE-2005-2975
io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ prior to 2.8.7 allows malicious users to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
Gnome Gdkpixbuf
Gnome Gtk
668
VMScore
CVE-2012-0828
Heap-based buffer overflow in Xchat-WDK prior to 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote malicious users to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the ...
Gnome Gtk 2.10.4
Gnome Gtk 2.14.7
Gnome Gtk 2.18.9
Gnome Gtk 2.24.7
Xchat Xchat
Xchat-wdk Xchat-wdk
552
VMScore
CVE-2000-0722
Helix GNOME Updater helix-update 0.5 and previous versions allows local users to install arbitrary RPM packages by creating the /tmp/helix-install installation directory before root has begun installing packages.
Helix Code Gnome Updater 0.4
Helix Code Gnome Updater 0.3
Helix Code Gnome Updater 0.1
Helix Code Gnome Updater 0.2
Helix Code Gnome Updater 0.5
445
VMScore
CVE-2003-0548
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Redhat Kdebase 2.2.3.1.20
Redhat Kdebase 2.2.3.1.22
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Redhat Kdebase 2.4.0.7.13
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
445
VMScore
CVE-2003-0549
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) via a short authorization key name.
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Redhat Kdebase 2.2.3.1.22
Redhat Kdebase 2.4.0.7.13
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Redhat Kdebase 2.2.3.1.20
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Redhat Kdebase 2.4.1.3.5
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »