Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.5.6 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.3.2
Kde Kde 2.2.1
Kde Kde 3.0 Beta 1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 4.0.3
Kde Kde 4.0.2
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.0 Beta
Kde Kde 2.2
Kde Kde 3.2.0 Beta1
Kde Kde 3.3.1
Kde Kde 3.1.1a
Kde Kde 3.5.5
Kde Kde 2.0.1
Kde Kde 2.2 Beta1
Kde Kde 3.2.2
Kde Kde 3.2.1
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.4.3
1 EDB exploit
NA
CVE-2008-1671
start_kdeinit in KDE 3.5.5 up to and including 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR...
Kde Kde 3.5.5
Kde Kde 3.5.7
Kde Kde 3.5.8
Kde Kde 3.5.9
Kde Kde 3.5.6
NA
CVE-2007-6000
KDE Konqueror 3.5.6 and previous versions allows remote malicious users to cause a denial of service (crash) via large HTTP cookie parameters.
Kde Konqueror
1 EDB exploit
NA
CVE-2007-4569
backend/session.c in KDM in KDE 3.3.0 up to and including 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote malicious users to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
Kde Kde 3.3.2
Kde Kde 3.3.1
Kde Kde 3.5.5
Kde Kde 3.4.3
Kde Kde 3.5.2
Kde Kde 3.4.0
Kde Kde 3.4
Kde Kde 3.5.0
Kde Kde 3.5.4
Kde Kde 3.5.7
Kde Kde 3.5
Kde Kde 3.5.3
Kde Kde 3.3
Kde Kde 3.5.1
Kde Kde 3.4.2
Kde Kde 3.5.6
Kde Kde 3.4.1
Kde Kde 3.3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started