Show filters
309 Total Results
Displaying 81-90 of 309
Sort by:
Attacker Value
Unknown

CVE-2016-1000002

Disclosure Date: November 05, 2019 (last updated November 27, 2024)
gdm3 3.14.2 and possibly later has an information leak before screen lock
Attacker Value
Unknown

CVE-2013-3718

Disclosure Date: November 01, 2019 (last updated November 27, 2024)
evince is missing a check on number of pages which can lead to a segmentation fault
Attacker Value
Unknown

CVE-2019-17266

Disclosure Date: October 06, 2019 (last updated November 08, 2023)
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
Attacker Value
Unknown

CVE-2019-16680

Disclosure Date: September 21, 2019 (last updated November 27, 2024)
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
Attacker Value
Unknown

CVE-2019-3890

Disclosure Date: August 01, 2019 (last updated November 27, 2024)
It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
0
Attacker Value
Unknown

CVE-2019-1010238

Disclosure Date: July 19, 2019 (last updated November 08, 2023)
Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize.
Attacker Value
Unknown

CVE-2019-1010006

Disclosure Date: July 15, 2019 (last updated February 02, 2024)
Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail.
Attacker Value
Unknown

CVE-2019-13012

Disclosure Date: June 28, 2019 (last updated November 08, 2023)
The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
0
Attacker Value
Unknown

CVE-2019-12795

Disclosure Date: June 11, 2019 (last updated November 08, 2023)
daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x before 1.40.2, and 1.41.x before 1.41.3 opened a private D-Bus server socket without configuring an authorization rule. A local attacker could connect to this server socket and issue D-Bus method calls. (Note that the server socket only accepts a single connection, so the attacker would have to discover the server and connect to the socket before its owner does.)
0
Attacker Value
Unknown

CVE-2019-12450

Disclosure Date: May 29, 2019 (last updated November 08, 2023)
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.