Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kdelibs 3.2.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-1165
Konqueror 3.3.1 allows remote malicious users to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT co...
Kde Kdelibs 3.1.4
Kde Kdelibs 3.1.5
Kde Kdelibs 3.2
Kde Kdelibs 3.2.1
Kde Kdelibs 3.1
Kde Kdelibs 3.2.2
Kde Konqueror 3.3.1
Kde Kdelibs 3.1.1
Kde Kdelibs 3.1.2
Kde Kdelibs 3.1.3
1 EDB exploit
7.5
CVSSv2
CVE-2004-0721
Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
Kde Konqueror 3.1.3
Kde Konqueror 3.2.2
7.5
CVSSv2
CVE-2006-0019
Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 up to and including 3.5.0 allows remote malicious users to execute arbitrary code via a crafted, UTF-8 encoded URI.
Kde Kde 3.2.0 Beta1
Kde Kde 3.2.1
Kde Kde 3.3.2
Kde Kde 3.3.x
Kde Kde 3.2.x
Kde Kde 3.3
Kde Kde 3.4.1
Kde Kde 3.4.2
Kde Kde 3.2
Kde Kde 3.2.0
Kde Kde 3.3.0
Kde Kde 3.3.1
Kde Kde 3.5.0
Kde Kde 3.2.2
Kde Kde 3.2.3
Kde Kde 3.4
Kde Kde 3.4.0
2.6
CVSSv2
CVE-2006-3672
KDE Konqueror 3.5.1 and previous versions allows remote malicious users to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argumen...
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Kde Konqueror
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5
Kde Konqueror 3.0.5b
Kde Konqueror 3.2.2
Kde Konqueror 3.2.2.6
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Kde Konqueror 3.3.1
Kde Konqueror 3.3.2
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
1 EDB exploit
7.5
CVSSv2
CVE-2004-1158
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a ...
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Kde Konqueror 3.3
Kde Konqueror 3.3.1
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5b
Kde Konqueror 3.1
Kde Konqueror 3.2.2.6
Kde Konqueror 3.2.3
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.2
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Kde Konqueror 3.3.2
7.5
CVSSv2
CVE-2004-0411
The URI handlers in Konqueror for KDE 3.2.2 and previous versions do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote malicious users to manipulate the options that are passed to the as...
Kde Konqueror
9.3
CVSSv2
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
9.3
CVSSv2
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
9.3
CVSSv2
CVE-2009-1725
WebKit in Apple Safari prior to 4.0.2, as used on iPhone OS prior to 3.1, iPhone OS prior to 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.1.1
Apple Safari 3.1.0b
Apple Safari 3.0.2
Apple Safari 4.0.0b
Apple Safari 3.1.0
Apple Safari 4.0
Apple Safari 3.2.2
Apple Safari 3.0.3b
Apple Safari 3.0.0b
Apple Safari 3.1.2
Apple Safari 3.0.3
Apple Safari 2.0.4
Apple Safari 2.0.0
Apple Safari 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started