Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2012-5535
gnome-system-log polkit policy allows arbitrary files on the system to be read
Gnome Gnome-system-log -
Fedoraproject Fedora 17
Fedoraproject Fedora 18
NA
CVE-2011-2198
The "insert-blank-characters" capability in caps.c in gnome-terminal (vte) prior to 0.28.1 allows remote authenticated users to cause a denial of service (CPU and memory consumption and crash) via a crafted file, as demonstrated by a file containing the string "\03...
Gnome Gnome-terminal
Opensuse Opensuse 12.1
Opensuse Opensuse 11.4
Oracle Solaris 11.2
NA
CVE-2005-2944
The perform_file_save function in GNOME Workstation Command Center (gwcc) 0.9.6 and previous versions allows local users to create and overwrite arbitrary files via a symlink attack on the gwcc_out.txt temporary file.
Brent Ely Gnome Workstation Command Center 0.9.8
Brent Ely Gnome Workstation Command Center
NA
CVE-2011-3146
librsvg prior to 2.34.1 uses the node name to identify the type of node, which allows context-dependent malicious users to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "...
Gnome Librsvg
NA
CVE-2007-0010
The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) prior to 2.4.13 allows context-dependent malicious users to cause a denial of service (crash) via a malformed image file.
Gnome Gtk
1 EDB exploit
7.5
CVSSv3
CVE-2015-7557
The _rsvg_node_poly_build_path function in rsvg-shapes.c in librsvg prior to 2.40.7 allows context-dependent malicious users to cause a denial of service (out-of-bounds heap read) via an odd number of elements in a coordinate pair in an SVG document.
Gnome Librsvg
NA
CVE-2010-4831
Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ prior to 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.
Gnome Gtk
NA
CVE-2010-4833
Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ prior to 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.
Gnome Gtk
3.3
CVSSv3
CVE-2021-3349
GNOME Evolution up to and including 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, a...
Gnome Evolution
7
CVSSv3
CVE-2019-3827
An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious prog...
Gnome Gvfs
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »