Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.3.2 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2005-2097
xpdf and kpdf do not properly validate the "loca" table in PDF files, which allows local users to cause a denial of service (disk consumption and hang) via a PDF file with a "broken" loca table, which causes a large temporary file to be created when xpdf attem...
Kde Kpdf
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 3.0
Xpdf Xpdf 3.0 Pl2
7.5
CVSSv2
CVE-2005-1852
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg prior to 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
Ekg Ekg 1.1 Rc2
Ekg Ekg 1.3
Ekg Ekg 1.1
Ekg Ekg 1.1 Rc1
Ekg Ekg 1.4
Ekg Ekg 1.5
Ekg Ekg 1.0
Ekg Ekg 1.0 Rc2
Ekg Ekg 1.0 Rc3
Ekg Ekg 1.5 Rc1
Ekg Ekg 1.5 Rc2
Kde Kde 3.3
Kde Kde 3.3.1
Kde Kde 3.2.3
Kde Kde 3.3.2
Kde Kde 3.4
Kde Kde 3.4.0
Kde Kde 3.4.1
Centericq Centericq
Kadu Kadu
5
CVSSv2
CVE-2005-0404
KMail 1.7.1 in KDE 3.3.2 allows remote malicious users to spoof email information, such as whether the email has been digitally signed or encrypted, via HTML formatted email.
Kmail Kmail 1.7.1
Kde Kde 3.3.2
1 EDB exploit
10
CVSSv2
CVE-2005-0011
Multiple vulnerabilities in fliccd, when installed setuid root as part of the kdeedu Kstars support for Instrument Neutral Distributed Interface (INDI) in KDE 3.3 to 3.3.2, allow local users and remote malicious users to execute arbitrary code via stack-based buffer overflows.
Kde Kde 3.3.1
Kde Kde 3.3.2
Kde Kde 3.3
7.5
CVSSv2
CVE-2005-0754
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote malicious users to execute arbitrary code.
Kde Quanta 3.1
Conectiva Linux 10.0
Conectiva Linux 9.0
Kde Kde 3.2.1
Kde Kde 3.2.2
Ubuntu Ubuntu Linux 4.1
Ubuntu Ubuntu Linux 5.04
Kde Kde 3.2.3
Kde Kde 3.3
Gentoo Linux
Kde Kde 3.2
Redhat Fedora Core Core 3.0
Kde Kde 3.3.1
Kde Kde 3.3.2
Kde Kde 3.4
9.3
CVSSv2
CVE-2004-1125
Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitr...
Xpdf Xpdf 3.0
Easy Software Products Cups 1.1.20
Kde Kde 3.2.3
Kde Kde 3.3.2
7.5
CVSSv2
CVE-2004-1158
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a ...
Kde Konqueror 2.2.1
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.1.1
Kde Konqueror 3.1.2
Kde Konqueror 3.3
Kde Konqueror 3.3.1
Kde Konqueror 2.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.0.5b
Kde Konqueror 3.1
Kde Konqueror 3.2.2.6
Kde Konqueror 3.2.3
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.1.5
Kde Konqueror 3.2.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.2
Kde Konqueror 3.1.3
Kde Konqueror 3.1.4
Kde Konqueror 3.3.2
2.1
CVSSv2
CVE-2004-1171
KDE 3.2.x and 3.3.0 up to and including 3.3.2, when saving credentials that are (1) manually entered by the user or (2) created by the SMB protocol handler, stores those credentials for plaintext in the user's .desktop file, which may be created with world-readable permissio...
Kde Kde 3.3
Kde Kde 3.3.1
Redhat Fedora Core Core 3.0
Kde Kde 3.3.2
Mandrakesoft Mandrake Linux 10.0
Kde Kde 3.2
Kde Kde 3.2.1
Mandrakesoft Mandrake Linux 10.1
Kde Kde 3.2.2
Kde Kde 3.2.3
Redhat Fedora Core Core 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2