Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.0 beta vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.3.2
Kde Kde 2.2.1
Kde Kde 3.0 Beta 1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 4.0.3
Kde Kde 4.0.2
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.0 Beta
Kde Kde 2.2
Kde Kde 3.2.0 Beta1
Kde Kde 3.3.1
Kde Kde 3.1.1a
Kde Kde 3.5.5
Kde Kde 2.0.1
Kde Kde 2.2 Beta1
Kde Kde 3.2.2
Kde Kde 3.2.1
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.4.3
1 EDB exploit
NA
CVE-2009-0945
Array index error in the insertItemBefore method in WebKit, as used in Apple Safari prior to 3.2.3 and 4 Public Beta, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome Stable prior to 1.0.154.65, and possibly other prod...
Apple Safari
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.0.0
Apple Safari 1.0.0b1
Apple Safari 1.0.0b2
Apple Safari 1.0.1
Apple Safari 1.0.2
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.1.0
Apple Safari 1.1.1
Apple Safari 1.2
Apple Safari 1.2.0
Apple Safari 1.2.1
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2.4
Apple Safari 1.2.5
Apple Safari 1.3
Apple Safari 1.3.0
NA
CVE-2005-0078
The KDE screen saver in KDE prior to 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Kde Kde 2.2.1
Kde Kde 3.0 Beta 1
Kde Kde 2.0
Kde Kde 3.0.2
Redhat Enterprise Linux Desktop 3.0
Kde Kde 2.2
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Kde Kde 2.0.1
Kde Kde 2.2 Beta1
Debian Debian Linux 3.0
Kde Kde 2.1
Kde Kde 3.0.1
Redhat Linux Advanced Workstation 2.1
Kde Kde 2.1 Beta2
Kde Kde 3.0 Beta 2
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 1.1.2
Kde Kde 1.1.1
Kde Kde 1.1
Kde Kde 1.0
NA
CVE-2003-0690
KDM in KDE 3.1.3 and previous versions does not verify whether the pam_setcred function call succeeds, which may allow malicious users to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.0 Beta
Kde Kde 2.2
Kde Kde 3.1.1a
Kde Kde 2.0.1
Kde Kde 3.0.5b
Kde Kde 3.1.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.5a
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 1.1.2
Kde Kde 1.1.1
Kde Kde 3.1.3
Kde Kde 2.2.2
Kde Kde 3.1
NA
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.0 Beta
Kde Kde 2.2
Kde Kde 3.1.1a
Kde Kde 2.0.1
Kde Kde 3.0.5b
Kde Kde 3.1.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.5a
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 1.1.2
Kde Kde 1.1.1
Kde Kde 3.1.3
Kde Kde 2.2.2
Kde Kde 3.1
NA
CVE-2000-0491
Buffer overflow in the XDMCP parsing code of GNOME gdm, KDE kdm, and wdm allows remote malicious users to execute arbitrary commands or cause a denial of service via a long FORWARD_QUERY request.
Gnome Gdm 1.0
Suse Suse Linux 6.2
Caldera Openlinux
Suse Suse Linux 6.4
2 EDB exploits
NA
CVE-2000-0393
The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute.
Kde Kde 2.0 Beta
Kde Kde 1.1.1
Kde Kde 1.1
Kde Kde 1.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started