Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 1.2 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2003-0690
KDM in KDE 3.1.3 and previous versions does not verify whether the pam_setcred function call succeeds, which may allow malicious users to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3a
Kde Kde 3.0.4
Kde Kde 3.1.2
Kde Kde 3.1.3
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 3.0.5b
Kde Kde 3.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.1.1
Kde Kde 3.1.1a
Kde Kde 1.1.2
Kde Kde 1.2
9.3
CVSSv2
CVE-2009-1709
Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari prior to 4.0 allows remote malicious users to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, relat...
Apple Safari 3.1.2
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 2.0.2
Apple Safari 3.0
Apple Safari 1.0
Apple Safari 1.0.3
Apple Safari 2.0.4
Apple Safari 3.2.1
Apple Safari 3.0.3
Apple Safari 3.0.4
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 1.3
Apple Safari 3.2.3
Apple Safari
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 1.3.1
Apple Safari 1.3.2
Apple Safari 3.0.2
Apple Safari 0.9
9.3
CVSSv2
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
9.3
CVSSv2
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
9.3
CVSSv2
CVE-2009-0945
Array index error in the insertItemBefore method in WebKit, as used in Apple Safari prior to 3.2.3 and 4 Public Beta, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome Stable prior to 1.0.154.65, and possibly other prod...
Apple Safari 0.9
Apple Safari 1.0.2
Apple Safari 1.1.0
Apple Safari 1.1
Apple Safari 0.8
Apple Safari 1.0.3
Apple Safari 1.0.0
Apple Safari 1.2.0
Apple Safari 1.1.1
Apple Safari 1.3.0
Apple Safari 1.3.2
Apple Safari 1.3
Apple Safari 2.0.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 3.2
Apple Safari 3.2.0
Apple Safari 1.0
Apple Safari 1.0.0b1
Apple Safari 1.2
Apple Safari 1.2.4
Apple Safari 1.2.5
7.8
CVSSv2
CVE-2007-1265
KMail 1.9.5 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to forge ...
Kde K-mail 1.0.27
Kde K-mail 1.0.28
Kde K-mail 1.2
Kde K-mail 1.3.1
Kde K-mail 1.92
Kde K-mail 1.93
Kde K-mail 1.0.25
Kde K-mail 1.0.26
Kde K-mail 1.101
Kde K-mail 1.102
Kde K-mail 1.89
Kde K-mail 1.9.1
Kde K-mail 1.90
Kde K-mail 0.0.29.2
Kde K-mail 1.0.29
Kde K-mail 1.0.29.1
Kde K-mail 1.7.1
Kde K-mail 1.86.2.36
Kde K-mail 1.94
Kde K-mail 1.95
Kde K-mail 1.0.23
Kde K-mail 1.0.24
7.5
CVSSv2
CVE-2012-3455
Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in KOffice 2.3.3 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code ...
Kde Koffice 1.3
Kde Koffice 1.3.4
Kde Koffice 1.4.1
Kde Koffice 1.3.3
Kde Koffice 1.3.5
Kde Koffice
Kde Koffice 1.2.1
Kde Koffice 1.4.2
Kde Koffice 1.6.1
Kde Koffice 1.3.1
Kde Koffice 1.2
Kde Koffice 1.4
Kde Koffice 1.3.2
7.5
CVSSv2
CVE-2005-2971
Heap-based buffer overflow in the KWord RTF importer for KOffice 1.2.0 up to and including 1.4.1 allows remote malicious users to execute arbitrary code via a crafted RTF file.
Kde Koffice 1.3.3
Kde Koffice 1.3.4
Kde Koffice 1.3.1
Kde Koffice 1.3.2
Kde Koffice 1.4
Kde Koffice 1.4.1
Kde Koffice 1.2
Kde Koffice 1.3.5
Kde Koffice 1.3 Beta1
Kde Koffice 1.2.1
Kde Koffice 1.3
Kde Koffice 1.3 Beta2
Kde Koffice 1.3 Beta3
7.5
CVSSv2
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.0.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.1.3
Kde Kde 1.2
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.0.5a
Kde Kde 3.0.5b
Kde Kde 1.1
Kde Kde 2.1.1
7.2
CVSSv2
CVE-2000-0460
Buffer overflow in KDE kdesud on Linux allows local uses to gain privileges via a long DISPLAY environmental variable.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 1.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »