Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome-desktop vulnerabilities and exploits
(subscribe to this query)
694
VMScore
CVE-2005-2975
io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ prior to 2.8.7 allows malicious users to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
Gnome Gdkpixbuf
Gnome Gtk
668
VMScore
CVE-2005-3186
Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows malicious users to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
Gnome Gdkpixbuf
Gtk Gtk\\+ 2.4.0
668
VMScore
CVE-2005-2976
Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ prior to 2.8.7 allows malicious users to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
Gnome Gdkpixbuf 0.22
Gnome Gtk
668
VMScore
CVE-2004-0782
Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, allows remote malicious users to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overf...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
668
VMScore
CVE-2004-0783
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, may allow remote malicious users to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
605
VMScore
CVE-2019-11460
An issue exists in GNOME gnome-desktop 3.26, 3.28, and 3.30 before 3.30.2.2, and 3.32 before 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer...
Gnome Gnome-desktop 3.28.0
Gnome Gnome-desktop 3.26.0
Gnome Gnome-desktop
605
VMScore
CVE-2008-0072
Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and previous versions allows remote malicious users to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
Gnome Evolution
498
VMScore
CVE-2010-0285
gnome-screensaver 2.14.3, 2.22.2, 2.27.x, 2.28.0, and 2.28.3, when the X configuration enables the extend screen option, allows physically proximate malicious users to bypass screen locking, access an unattended workstation, and view half of the GNOME desktop by attaching an exte...
Gnome Screensaver 2.28.0
Gnome Screensaver 2.28.3
Gnome Screensaver 2.22.2
Gnome Screensaver 2.27
Gnome Screensaver 2.14.3
465
VMScore
CVE-2003-0165
Format string vulnerability in Eye Of Gnome (EOG) allows malicious users to execute arbitrary code via format string specifiers in a command line argument for the file to display.
Gnome Eog 1.0.0
Gnome Eog 1.1.3
Gnome Eog 1.1.4
Gnome Eog 1.0.1
Gnome Eog 1.0.2
Gnome Eog 2.2.0
Gnome Eog 1.1.1
Gnome Eog 1.1.2
Gnome Eog 1.0.3
Gnome Eog 1.0.4
1 EDB exploit
445
VMScore
CVE-2013-7324
Webkit-GTK 2.x (any version with HTML5 audio/video support based on GStreamer) allows remote malicious users to trigger unexpectedly high sound volume via malicious javascript. NOTE: this WebKit-GTK behavior complies with existing W3C standards and existing practices for GNOME de...
Webkitgtk Webkitgtk
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »