Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-2549
Multiple format string vulnerabilities in Evolution 1.5 up to and including 2.3.6.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from...
Gnome Evolution 2.0
Gnome Evolution 2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 1.5
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
NA
CVE-2003-0165
Format string vulnerability in Eye Of Gnome (EOG) allows malicious users to execute arbitrary code via format string specifiers in a command line argument for the file to display.
Gnome Eog 1.0.0
Gnome Eog 1.1.3
Gnome Eog 1.1.4
Gnome Eog 1.0.1
Gnome Eog 1.0.2
Gnome Eog 2.2.0
Gnome Eog 1.1.1
Gnome Eog 1.1.2
Gnome Eog 1.0.3
Gnome Eog 1.0.4
1 EDB exploit
NA
CVE-2003-0794
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not limit the number or duration of commands and uses a blocking socket connection, which allows malicious users to cause a denial of service (resource exhaustion) by sending commands and not reading the results.
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
NA
CVE-2004-0782
Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, allows remote malicious users to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overf...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
NA
CVE-2004-0783
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and previous versions, and gdk-pixbuf prior to 0.22, may allow remote malicious users to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for...
Gnome Gdkpixbuf 0.22
Gnome Gdkpixbuf 0.18
Gnome Gdkpixbuf 0.17
Gnome Gdkpixbuf 0.20
Gnome Gtk 2.0.2
Gnome Gtk 2.0.6
Gnome Gtk 2.2.1
Gnome Gtk 2.2.3
Gnome Gtk 2.2.4
NA
CVE-2003-0793
GDM 2.4.4.x prior to 2.4.4.4, and 2.4.1.x prior to 2.4.1.7, does not restrict the size of input, which allows malicious users to cause a denial of service (memory consumption).
Gnome Gdm 2.4.1.1
Gnome Gdm 2.4.1.2
Gnome Gdm 2.2.5.4
Gnome Gdm 2.4.1
Gnome Gdm 2.4.4
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.4
Gnome Gdm 2.4.1.5
Gnome Gdm 2.4.1.6
NA
CVE-2006-2789
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote malicious users to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-ad...
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
Gnome Evolution 2.3.1
Gnome Evolution 2.3.3
Gnome Evolution 2.3.7
Gnome Evolution 2.3.2
NA
CVE-2006-0528
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote malicious users to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very lon...
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.7
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
1 EDB exploit
NA
CVE-2012-3466
GNOME gnome-keyring 3.4.0 up to and including 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows malicious users to have an unspecified impact via unknown attack vectors.
Gnome Gnome-keyring 3.4.1
Gnome Gnome-keyring 3.4.0
NA
CVE-2010-0414
gnome-screensaver prior to 2.28.2 allows physically proximate malicious users to bypass screen locking and access an unattended workstation by moving the mouse position to an external monitor and then disconnecting that monitor.
Gnome Screensaver 2.20.0
Gnome Screensaver 2.20
Gnome Screensaver 2.28.0
Gnome Screensaver 2.26.1
Gnome Screensaver 2.13
Gnome Screensaver
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38298
CVE-2024-20356
CVE-2023-21987
CVE-2024-33217
bypass
CVE-2024-31804
CVE-2024-32660
unauthorized
SSRF
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »