Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 4.0.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-2451
Multiple format string vulnerabilities in the DCC functionality in KVIrc 3.4 and 4.0 have unspecified impact and remote attack vectors.
Kvirc Kvirc 3.4.0
Kvirc Kvirc 4.0
9.3
CVSSv2
CVE-2010-2452
Directory traversal vulnerability in the DCC functionality in KVIrc 3.4 and 4.0 allows remote malicious users to overwrite arbitrary files via unknown vectors.
Kvirc Kvirc 4.0
Kvirc Kvirc 3.4.0
9.3
CVSSv2
CVE-2008-1670
Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.
Kde Kde 4.0.0
Kde Kde 4.0.3
Kde Kde 4.0.1
Kde Kde 4.0.2
6.5
CVSSv2
CVE-2010-2785
The IRC Protocol component in KVIrc 3.x and 4.x before r4693 does not properly handle \ (backslash) characters, which allows remote authenticated users to execute arbitrary CTCP commands via vectors involving \r and \40 sequences, a different vulnerability than CVE-2010-2451 and ...
Kvirc Kvirc 4.0.2
Kvirc Kvirc 3.0.0
Kvirc Kvirc 3.4.0
Kvirc Kvirc 3.0.1
Kvirc Kvirc 4.0.0
Kvirc Kvirc 3.4.2
1 EDB exploit
6.4
CVSSv2
CVE-2010-1511
KGet 2.4.2 in KDE SC 4.0.0 up to and including 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote malicious users to overwrite arbitrary files via a crafted metalink file.
Kde Kget 2.4.2
Kde Kde Sc 4.3.5
Kde Kde Sc 4.3.4
Kde Kde Sc 4.0.1
Kde Kde Sc 2.2.0
Kde Kde Sc 4.1.0
Kde Kde Sc 4.1.80
Kde Kde Sc 4.4.3
Kde Kde Sc 4.2.3
Kde Kde Sc 4.1.1
Kde Kde Sc 4.4.0
Kde Kde Sc 3.5.10
Kde Kde Sc 4.4.1
Kde Kde Sc 4.0.0
Kde Kde Sc 4.1.96
Kde Kde Sc 4.1.85
Kde Kde Sc 4.2.1
Kde Kde Sc 4.2.0
Kde Kde Sc 4.2.4
Kde Kde Sc 4.4.2
Kde Kde Sc 4.3.0
Kde Kde Sc 4.2.2
5.8
CVSSv2
CVE-2011-1586
Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and previous versions allows remote malicious users to create arbitrary files via a .. (dot dot) in the name attribute of a file elem...
Kde Kde Sc 4.1.0
Kde Kde Sc 4.0.3
Kde Kde Sc 4.0.5
Kde Kde Sc 4.5.2
Kde Kde Sc 4.3.0
Kde Kde Sc 4.0.0
Kde Kde Sc 4.2.3
Kde Kde Sc 4.1.3
Kde Kde Sc 4.4.0
Kde Kde Sc 4.6
Kde Kde Sc 4.5.4
Kde Kde Sc 4.2
Kde Kde Sc 4.4.1
Kde Kde Sc 4.2.2
Kde Kde Sc 4.4.2
Kde Kde Sc 4.5.5
Kde Kde Sc 4.5.1
Kde Kde Sc 2.2.0
Kde Kde Sc 4.1.2
Kde Kde Sc 4.2.1
Kde Kde Sc 4.4.3
Kde Kde Sc 4.3.5
5.8
CVSSv2
CVE-2010-1000
Directory traversal vulnerability in KGet in KDE SC 4.0.0 up to and including 4.4.3 allows remote malicious users to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
Kde Kde Sc 4.3.0
Kde Kde Sc 4.4.0
Kde Kde Sc 4.1.80
Kde Kde Sc 4.1.85
Kde Kde Sc 4.1.1
Kde Kde Sc 4.2.2
Kde Kde Sc 4.0.0
Kde Kde Sc 4.0.4
Kde Kde Sc 4.0.5
Kde Kde Sc 4.3.4
Kde Kde Sc 4.3.5
Kde Kde Sc 4.4.2
Kde Kde Sc 4.4.3
Kde Kde Sc 4.1.3
Kde Kde Sc 4.1.2
Kde Kde Sc 4.0.2
Kde Kde Sc 4.0.3
Kde Kde Sc 4.1.0
Kde Kde Sc 4.2.4
Kde Kde Sc 4.3.2
Kde Kde Sc 4.3.3
Kde Kde Sc 4.4.1
5
CVSSv2
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started