Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.3.x vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
NA
CVE-2006-0019
Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 up to and including 3.5.0 allows remote malicious users to execute arbitrary code via a crafted, UTF-8 encoded URI.
Kde Kde 3.2.0 Beta1
Kde Kde 3.2.1
Kde Kde 3.3.2
Kde Kde 3.3.x
Kde Kde 3.2.x
Kde Kde 3.3
Kde Kde 3.4.1
Kde Kde 3.4.2
Kde Kde 3.2
Kde Kde 3.2.0
Kde Kde 3.3.0
Kde Kde 3.3.1
Kde Kde 3.5.0
Kde Kde 3.2.2
Kde Kde 3.2.3
Kde Kde 3.4
Kde Kde 3.4.0
NA
CVE-2005-0365
The dcopidlng script in KDE 3.2.x and 3.3.x creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
Kde Kde 3.2.x
Kde Kde 3.3.x
NA
CVE-2004-1125
Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitr...
Xpdf Xpdf 3.0
Easy Software Products Cups 1.1.20
Kde Kde 3.2.3
Kde Kde 3.3.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started