cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-1000044,https://securityvulnerability.io/vulnerability/CVE-2017-1000044,,gtk-vnc 0.4.2 and older doesn't check framebuffer boundaries correctly when updating framebuffer which may lead to memory corruption when rendering,Gnome,Gtk-vnc,9.8,CRITICAL,0.0035000001080334187,false,,false,false,false,,,false,false,,2017-07-17T13:18:00.000Z,0 CVE-2010-4831,https://securityvulnerability.io/vulnerability/CVE-2010-4831,,Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ before 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.,Gnome,Gtk,,,0.0004400000034365803,false,,false,false,false,,,false,false,,2011-09-06T15:55:00.000Z,0 CVE-2010-4833,https://securityvulnerability.io/vulnerability/CVE-2010-4833,,"Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ before 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.",Gnome,Gtk,,,0.0009299999801442027,false,,false,false,false,,,false,false,,2011-09-06T15:00:00.000Z,0 CVE-2010-0732,https://securityvulnerability.io/vulnerability/CVE-2010-0732,,"gdk/gdkwindow.c in GTK+ before 2.18.5, as used in gnome-screensaver before 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate attackers to bypass screen locking and access an unattended workstation by pressing the Enter key many times.",Gnome,Gtk,,,0.0006399999838322401,false,,false,false,false,,,false,false,,2010-03-19T19:00:00.000Z,0 CVE-2007-0010,https://securityvulnerability.io/vulnerability/CVE-2007-0010,,The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.,Gnome,Gtk,,,0.0007800000021234155,false,,false,false,false,,,false,false,,2007-01-24T19:00:00.000Z,0 CVE-2005-2976,https://securityvulnerability.io/vulnerability/CVE-2005-2976,,"Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.",Gnome,"Gdkpixbuf,Gtk",,,0.04191000014543533,false,,false,false,false,,,false,false,,2005-11-18T11:00:00.000Z,0 CVE-2005-3186,https://securityvulnerability.io/vulnerability/CVE-2005-3186,,"Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.",Gnome,"Gdkpixbuf,Gtk\+",,,0.016769999638199806,false,,false,false,false,,,false,false,,2005-11-18T11:00:00.000Z,0 CVE-2005-0372,https://securityvulnerability.io/vulnerability/CVE-2005-0372,,Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.,Gnome,Gtk,,,0.0839800015091896,false,,false,false,false,,,false,false,,2005-05-02T04:00:00.000Z,0 CVE-2005-0891,https://securityvulnerability.io/vulnerability/CVE-2005-0891,,Double free vulnerability in gtk 2 (gtk2) before 2.2.4 allows remote attackers to cause a denial of service (crash) via a crafted BMP image.,Gnome,Gtk,7.5,HIGH,0.012500000186264515,false,,false,false,false,,,false,false,,2005-05-02T04:00:00.000Z,0 CVE-2004-0753,https://securityvulnerability.io/vulnerability/CVE-2004-0753,,The BMP image processor for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted BMP file.,Gnome,"Gdkpixbuf,Gtk",,,0.12278000265359879,false,,false,false,false,,,false,false,,2004-10-20T04:00:00.000Z,0 CVE-2004-0783,https://securityvulnerability.io/vulnerability/CVE-2004-0783,,"Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).",Gnome,"Gdkpixbuf,Gtk",,,0.7069299817085266,false,,false,false,false,,,false,false,,2004-10-20T04:00:00.000Z,0 CVE-2004-0788,https://securityvulnerability.io/vulnerability/CVE-2004-0788,,Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file.,Gnome,"Gdkpixbuf,Gtk",,,0.1951500028371811,false,,false,false,false,,,false,false,,2004-10-20T04:00:00.000Z,0 CVE-2004-0782,https://securityvulnerability.io/vulnerability/CVE-2004-0782,,"Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).",Gnome,"Gdkpixbuf,Gtk",,,0.655269980430603,false,,false,false,false,,,false,false,,2004-10-20T04:00:00.000Z,0 CVE-2001-0084,https://securityvulnerability.io/vulnerability/CVE-2001-0084,,"GTK+ library allows local users to specify arbitrary modules via the GTK_MODULES environmental variable, which could allow local users to gain privileges if GTK+ is used by a setuid/setgid program.",Gnome,Gtk,,,0.00044999999227002263,false,,false,false,false,,,false,false,,2001-02-12T05:00:00.000Z,0