Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 4.0.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-1670
Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.
Kde Kde 4.0.0
Kde Kde 4.0.3
Kde Kde 4.0.1
Kde Kde 4.0.2
5.8
CVSSv2
CVE-2010-1000
Directory traversal vulnerability in KGet in KDE SC 4.0.0 up to and including 4.4.3 allows remote malicious users to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
Kde Kde Sc 4.3.0
Kde Kde Sc 4.4.0
Kde Kde Sc 4.1.80
Kde Kde Sc 4.1.85
Kde Kde Sc 4.1.1
Kde Kde Sc 4.2.2
Kde Kde Sc 4.0.0
Kde Kde Sc 4.0.4
Kde Kde Sc 4.0.5
Kde Kde Sc 4.3.4
Kde Kde Sc 4.3.5
Kde Kde Sc 4.4.2
Kde Kde Sc 4.4.3
Kde Kde Sc 4.1.3
Kde Kde Sc 4.1.2
Kde Kde Sc 4.0.2
Kde Kde Sc 4.0.3
Kde Kde Sc 4.1.0
Kde Kde Sc 4.2.4
Kde Kde Sc 4.3.2
Kde Kde Sc 4.3.3
Kde Kde Sc 4.4.1
5.8
CVSSv2
CVE-2011-1586
Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and previous versions allows remote malicious users to create arbitrary files via a .. (dot dot) in the name attribute of a file elem...
Kde Kde Sc 4.1.0
Kde Kde Sc 4.0.3
Kde Kde Sc 4.0.5
Kde Kde Sc 4.5.2
Kde Kde Sc 4.3.0
Kde Kde Sc 4.0.0
Kde Kde Sc 4.2.3
Kde Kde Sc 4.1.3
Kde Kde Sc 4.4.0
Kde Kde Sc 4.6
Kde Kde Sc 4.5.4
Kde Kde Sc 4.2
Kde Kde Sc 4.4.1
Kde Kde Sc 4.2.2
Kde Kde Sc 4.4.2
Kde Kde Sc 4.5.5
Kde Kde Sc 4.5.1
Kde Kde Sc 2.2.0
Kde Kde Sc 4.1.2
Kde Kde Sc 4.2.1
Kde Kde Sc 4.4.3
Kde Kde Sc 4.3.5
5
CVSSv2
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
6.4
CVSSv2
CVE-2010-1511
KGet 2.4.2 in KDE SC 4.0.0 up to and including 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote malicious users to overwrite arbitrary files via a crafted metalink file.
Kde Kget 2.4.2
Kde Kde Sc 4.3.5
Kde Kde Sc 4.3.4
Kde Kde Sc 4.0.1
Kde Kde Sc 2.2.0
Kde Kde Sc 4.1.0
Kde Kde Sc 4.1.80
Kde Kde Sc 4.4.3
Kde Kde Sc 4.2.3
Kde Kde Sc 4.1.1
Kde Kde Sc 4.4.0
Kde Kde Sc 3.5.10
Kde Kde Sc 4.4.1
Kde Kde Sc 4.0.0
Kde Kde Sc 4.1.96
Kde Kde Sc 4.1.85
Kde Kde Sc 4.2.1
Kde Kde Sc 4.2.0
Kde Kde Sc 4.2.4
Kde Kde Sc 4.4.2
Kde Kde Sc 4.3.0
Kde Kde Sc 4.2.2
6.5
CVSSv2
CVE-2010-2785
The IRC Protocol component in KVIrc 3.x and 4.x before r4693 does not properly handle \ (backslash) characters, which allows remote authenticated users to execute arbitrary CTCP commands via vectors involving \r and \40 sequences, a different vulnerability than CVE-2010-2451 and ...
Kvirc Kvirc 4.0.2
Kvirc Kvirc 3.0.0
Kvirc Kvirc 3.4.0
Kvirc Kvirc 3.0.1
Kvirc Kvirc 4.0.0
Kvirc Kvirc 3.4.2
1 EDB exploit
10
CVSSv2
CVE-2010-2451
Multiple format string vulnerabilities in the DCC functionality in KVIrc 3.4 and 4.0 have unspecified impact and remote attack vectors.
Kvirc Kvirc 3.4.0
Kvirc Kvirc 4.0
9.3
CVSSv2
CVE-2010-2452
Directory traversal vulnerability in the DCC functionality in KVIrc 3.4 and 4.0 allows remote malicious users to overwrite arbitrary files via unknown vectors.
Kvirc Kvirc 4.0
Kvirc Kvirc 3.4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started