Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome gdm 2.4.4 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2003-0793
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not restrict the size of input, which allows malicious users to cause a denial of service (memory consumption).
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
2.1
CVSSv2
CVE-2003-0794
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows malicious users to cause a denial of service (resource exhaustion) by sending commands and not reading the results.
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started