Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde konqueror 3.5.7 vulnerabilities and exploits
(subscribe to this query)
231
VMScore
CVE-2007-3820
konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote malicious users to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
Kde Konqueror 3.5.7
383
VMScore
CVE-2007-4224
KDE Konqueror 3.5.7 allows remote malicious users to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
Kde Konqueror 3.5.7
605
VMScore
CVE-2007-4225
Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote malicious users to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion.
Kde Konqueror 3.5.7
435
VMScore
CVE-2007-4229
Unspecified vulnerability in KDE Konqueror 3.5.7 and previous versions allows remote malicious users to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET...
Kde Konqueror
1 EDB exploit
505
VMScore
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started