Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1393
Multiple vulnerabilities in KDE 2 and KDE 3.x up to and including 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote malicious users to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
Kde Kde 2.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0.1
Kde Kde 3.0.2
NA
CVE-2002-1247
Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
Kde Klisa 2.2.2
Lisa Lisa 0.1
Lisa Lisa 0.1.2
Kde Kde 2.2
Kde Kde 3.0
Kde Kde 2.0
Kde Kde 2.1
Kde Kde 3.0.4
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
NA
CVE-2003-0204
KDE 2 and KDE 3.1.1 and previous versions 3.x versions allows malicious users to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 2.0.1
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.0.5a
NA
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.0.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.1.3
Kde Kde 1.2
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.0.5a
Kde Kde 3.0.5b
Kde Kde 1.1
Kde Kde 2.1.1
NA
CVE-2003-0690
KDM in KDE 3.1.3 and previous versions does not verify whether the pam_setcred function call succeeds, which may allow malicious users to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3a
Kde Kde 3.0.4
Kde Kde 3.1.2
Kde Kde 3.1.3
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 3.0.5b
Kde Kde 3.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.1.1
Kde Kde 3.1.1a
Kde Kde 1.1.2
Kde Kde 1.2
NA
CVE-2000-0393
The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.2
Kde Kde 2.0 Beta
1 EDB exploit
NA
CVE-2005-0078
The KDE screen saver in KDE prior to 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Debian Debian Linux 3.0
Kde Kde 1.0
Kde Kde 2.1 Beta2
Kde Kde 2.2
Kde Kde 3.0.4
Kde Kde 3.0 Beta 1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2.1
Kde Kde 2.2 Beta1
Kde Kde 3.0 Beta 2
Redhat Enterprise Linux 2.1
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 2.1
Kde Kde 2.1 Beta1
NA
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
NA
CVE-2004-0888
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identifi...
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.12
Easy Software Products Cups 1.1.19
Easy Software Products Cups 1.1.19 Rc5
Gnome Gpdf 0.112
Gnome Gpdf 0.131
Kde Koffice 1.3 Beta3
Kde Kpdf 3.2
Pdftohtml Pdftohtml 0.36
Tetex Tetex 1.0.7
Xpdf Xpdf 1.0
Xpdf Xpdf 1.0a
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.1.15
Easy Software Products Cups 1.1.16
Easy Software Products Cups 1.1.4 2
Easy Software Products Cups 1.1.4 3
Kde Koffice 1.3.2
Kde Koffice 1.3.3
Pdftohtml Pdftohtml 0.33
Pdftohtml Pdftohtml 0.33a
Tetex Tetex 2.0.2
NA
CVE-2004-0889
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
Easy Software Products Cups 1.0.4
Easy Software Products Cups 1.1.12
Easy Software Products Cups 1.1.13
Easy Software Products Cups 1.1.19 Rc5
Easy Software Products Cups 1.1.20
Gnome Gpdf 0.131
Kde Koffice 1.3
Kde Kpdf 3.2
Pdftohtml Pdftohtml 0.32a
Tetex Tetex 1.0.7
Tetex Tetex 2.0
Xpdf Xpdf 1.0a
Xpdf Xpdf 1.1
Easy Software Products Cups 1.1.1
Easy Software Products Cups 1.1.10
Easy Software Products Cups 1.1.18
Easy Software Products Cups 1.1.19
Easy Software Products Cups 1.1.7
Gnome Gpdf 0.112
Kde Koffice 1.3 Beta2
Kde Koffice 1.3 Beta3
Pdftohtml Pdftohtml 0.35
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »