Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.2.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2003-0690
KDM in KDE 3.1.3 and previous versions does not verify whether the pam_setcred function call succeeds, which may allow malicious users to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3a
Kde Kde 3.0.4
Kde Kde 3.1.2
Kde Kde 3.1.3
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 3.0.5b
Kde Kde 3.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.1.1
Kde Kde 3.1.1a
Kde Kde 1.1.2
Kde Kde 1.2
9.3
CVSSv2
CVE-2009-1725
WebKit in Apple Safari prior to 4.0.2, as used on iPhone OS prior to 3.1, iPhone OS prior to 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.1.1
Apple Safari 3.1.0b
Apple Safari 3.0.2
Apple Safari 4.0.0b
Apple Safari 3.1.0
Apple Safari 4.0
Apple Safari 3.2.2
Apple Safari 3.0.3b
Apple Safari 3.0.0b
Apple Safari 3.1.2
Apple Safari 3.0.3
Apple Safari 2.0.4
Apple Safari 2.0.0
Apple Safari 2.0
9.3
CVSSv2
CVE-2009-1698
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1b
Apple Safari 3.1.2
Apple Safari 3.1.1
Apple Safari 3.0.2b
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 2.0
Apple Safari
Apple Safari 3.0.0b
Apple Safari 3.2.0
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 2.0.0
9.3
CVSSv2
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
9.3
CVSSv2
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
9.3
CVSSv2
CVE-2009-0945
Array index error in the insertItemBefore method in WebKit, as used in Apple Safari prior to 3.2.3 and 4 Public Beta, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome Stable prior to 1.0.154.65, and possibly other prod...
Apple Safari 0.9
Apple Safari 1.0.2
Apple Safari 1.1.0
Apple Safari 1.1
Apple Safari 0.8
Apple Safari 1.0.3
Apple Safari 1.0.0
Apple Safari 1.2.0
Apple Safari 1.1.1
Apple Safari 1.3.0
Apple Safari 1.3.2
Apple Safari 1.3
Apple Safari 2.0.3
Apple Safari 3.0.1
Apple Safari 3.0.2
Apple Safari 3.2
Apple Safari 3.2.0
Apple Safari 1.0
Apple Safari 1.0.0b1
Apple Safari 1.2
Apple Safari 1.2.4
Apple Safari 1.2.5
7.5
CVSSv2
CVE-2004-1158
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a ...
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Kde Konqueror 3.3
Kde Konqueror 3.3.1
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5b
Kde Konqueror 3.1
Kde Konqueror 3.2.2.6
Kde Konqueror 3.2.3
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.2
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Kde Konqueror 3.3.2
7.5
CVSSv2
CVE-2004-0867
Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote malicious users to perform a session fixation attack and hijack a user's HTTP session. NOTE: it was later reported th...
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Microsoft Ie 6.0
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5
Kde Konqueror 3.0.5b
Kde Konqueror 3.2.3
Microsoft Internet Explorer 6.0
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Mozilla Firefox 0.9.2
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Suse Suse Linux 9.0
7.5
CVSSv2
CVE-2004-0866
Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote malicious users to perform a session fixation attack and hijack a user's HTTP session.
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.1.4
Kde Konqueror 3.1.5
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.2
Kde Konqueror 3.1.3
Mozilla Firefox 0.9.2
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5
Kde Konqueror 3.0.5b
Kde Konqueror 3.2.1
Kde Konqueror 3.2.3
Microsoft Internet Explorer 6.0
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Microsoft Ie 6.0
Suse Suse Linux 1.0
7.5
CVSSv2
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.0.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.1.3
Kde Kde 1.2
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.0.5a
Kde Kde 3.0.5b
Kde Kde 1.1
Kde Kde 2.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
IMAP
CVE-2024-4367
server-side request forgery
information disclosure
CVE-2024-34342
CVE-2024-4281
CVE-2024-3507
CVE-2024-25560
CVE-2024-34574
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »