Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome-desktop vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2004-0782
Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, allows remote malicious users to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overf...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
445
VMScore
CVE-2004-0788
Integer overflow in the ICO image decoder for (1) gdk-pixbuf prior to 0.22 and (2) gtk2 prior to 2.2.4 allows remote malicious users to cause a denial of service (application crash) via a crafted ICO file.
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk
668
VMScore
CVE-2004-0783
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, may allow remote malicious users to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
465
VMScore
CVE-2003-0165
Format string vulnerability in Eye Of Gnome (EOG) allows malicious users to execute arbitrary code via format string specifiers in a command line argument for the file to display.
Gnome Eog 1.0.0
Gnome Eog 1.1.3
Gnome Eog 1.1.4
Gnome Eog 1.0.1
Gnome Eog 1.0.2
Gnome Eog 2.2.0
Gnome Eog 1.1.1
Gnome Eog 1.1.2
Gnome Eog 1.0.3
Gnome Eog 1.0.4
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2