Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.2.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0527
KDE Konqueror 2.1.1 and 2.2.2 allows remote malicious users to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a ...
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.1.3
Kde Konqueror 3.2.1
Kde Konqueror 2.1.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.1
1 EDB exploit
NA
CVE-2003-0592
Konqueror in KDE 3.1.3 and previous versions (kdelibs) allows remote malicious users to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outsi...
Kde Konqueror 2.1.1
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.1.2
Kde Konqueror Embedded 0.1
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.0.1
Kde Konqueror 3.0.2
NA
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.0.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.1.3
Kde Kde 1.2
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.0.5a
Kde Kde 3.0.5b
Kde Kde 1.1
Kde Kde 2.1.1
NA
CVE-2003-0690
KDM in KDE 3.1.3 and previous versions does not verify whether the pam_setcred function call succeeds, which may allow malicious users to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3a
Kde Kde 3.0.4
Kde Kde 3.1.2
Kde Kde 3.1.3
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 3.0.5b
Kde Kde 3.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.1.1
Kde Kde 3.1.1a
Kde Kde 1.1.2
Kde Kde 1.2
NA
CVE-2003-0459
KDE Konqueror for KDE 3.1.2 and previous versions does not remove authentication credentials from URLs of the "user:password@host" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites.
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror Embedded 0.1
Redhat Analog Real-time Synthesizer 2.1.1-5
Redhat Kdelibs 3.0.0-10
Redhat Kdelibs 3.1-10
Redhat Kdelibs Sound 2.1.1-5
Redhat Kdelibs Sound 2.2-11
Kde Konqueror 3.0.5
Kde Konqueror 3.1
Redhat Kdebase 3.0.3-13
Redhat Kdelibs Devel 2.2-11
Redhat Kdelibs Devel 3.0.0-10
Redhat Kdelibs Sound Devel 2.2-11
Kde Konqueror 3.0.2
Kde Konqueror 3.0.3
Redhat Analog Real-time Synthesizer 2.2-11
Redhat Kdelibs Devel 2.1.1-5
Redhat Kdelibs Sound Devel 2.1.1-5
Kde Konqueror 2.1.1
Kde Konqueror 2.2.2
Kde Konqueror 3.1.1
NA
CVE-2003-0370
Konqueror Embedded and KDE 2.2.2 and previous versions does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote malicious users to spoof certificates via a man-in-the-middle attack.
Apple Safari 1.0
Kde Konqueror Embedded 0.1
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Workstation 8.0
Redhat Linux 7.1
Redhat Linux 7.2
Turbolinux Turbolinux Server 7.0
Turbolinux Turbolinux Workstation 7.0
Kde Kde
NA
CVE-2003-0204
KDE 2 and KDE 3.1.1 and previous versions 3.x versions allows malicious users to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 2.0.1
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.0.5a
NA
CVE-2002-1393
Multiple vulnerabilities in KDE 2 and KDE 3.x up to and including 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote malicious users to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
Kde Kde 2.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0.1
Kde Kde 3.0.2
NA
CVE-2002-2333
Buffer overflow in konqueror in KDE 2.1 up to and including 3.0 and 3.0.2 allows remote malicious users to cause a denial of service (crash) via an IMG tag with large width and height attributes.
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 2.2.2
Kde Kde 3.0
NA
CVE-2002-1247
Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
Kde Klisa 2.2.2
Lisa Lisa 0.1
Lisa Lisa 0.1.2
Kde Kde 2.2
Kde Kde 3.0
Kde Kde 2.0
Kde Kde 2.1
Kde Kde 3.0.4
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »