Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome-desktop vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2005-2975
io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ prior to 2.8.7 allows malicious users to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
Gnome Gdkpixbuf
Gnome Gtk
7.5
CVSSv2
CVE-2005-2976
Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ prior to 2.8.7 allows malicious users to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
Gnome Gdkpixbuf 0.22
Gnome Gtk
7.5
CVSSv2
CVE-2005-3186
Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows malicious users to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
Gnome Gdkpixbuf
Gtk Gtk\\+ 2.4.0
7.5
CVSSv2
CVE-2004-0783
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, may allow remote malicious users to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
7.5
CVSSv2
CVE-2004-0782
Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, allows remote malicious users to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overf...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
6.8
CVSSv2
CVE-2019-11460
An issue exists in GNOME gnome-desktop 3.26, 3.28, and 3.30 before 3.30.2.2, and 3.32 before 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer...
Gnome Gnome-desktop 3.28.0
Gnome Gnome-desktop 3.26.0
Gnome Gnome-desktop
6.8
CVSSv2
CVE-2008-0072
Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and previous versions allows remote malicious users to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
Gnome Evolution
5.6
CVSSv2
CVE-2010-0285
gnome-screensaver 2.14.3, 2.22.2, 2.27.x, 2.28.0, and 2.28.3, when the X configuration enables the extend screen option, allows physically proximate malicious users to bypass screen locking, access an unattended workstation, and view half of the GNOME desktop by attaching an exte...
Gnome Screensaver 2.28.0
Gnome Screensaver 2.28.3
Gnome Screensaver 2.22.2
Gnome Screensaver 2.27
Gnome Screensaver 2.14.3
5
CVSSv2
CVE-2013-7324
Webkit-GTK 2.x (any version with HTML5 audio/video support based on GStreamer) allows remote malicious users to trigger unexpectedly high sound volume via malicious javascript. NOTE: this WebKit-GTK behavior complies with existing W3C standards and existing practices for GNOME de...
Webkitgtk Webkitgtk
5
CVSSv2
CVE-2004-0753
The BMP image processor for (1) gdk-pixbuf prior to 0.22 and (2) gtk2 prior to 2.2.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted BMP file.
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »