Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde applications vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2009-2408
Mozilla Network Security Services (NSS) prior to 3.12.3, Firefox prior to 3.0.13, Thunderbird prior to 2.0.0.23, and SeaMonkey prior to 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, ...
Mozilla Network Security Services
Mozilla Firefox
Mozilla Seamonkey
Mozilla Thunderbird
Suse Linux Enterprise Server 9
Suse Linux Enterprise 11.0
Suse Linux Enterprise 10.0
Opensuse Opensuse
Debian Debian Linux 5.0
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
9.3
CVSSv2
CVE-2009-1698
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1b
Apple Safari 3.1.2
Apple Safari 3.1.1
Apple Safari 3.0.2b
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 2.0
Apple Safari
Apple Safari 3.0.0b
Apple Safari 3.2.0
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 2.0.0
9.3
CVSSv2
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
9.3
CVSSv2
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
5
CVSSv2
CVE-2009-1188
Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x prior to 3.02pl4 and Poppler prior to 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote malicious users to execute arbitrary code or cause a denial o...
Poppler Poppler 0.7.3
Poppler Poppler 0.3.2
Poppler Poppler 0.10.3
Poppler Poppler 0.4.0
Poppler Poppler 0.8.5
Poppler Poppler 0.9.3
Poppler Poppler 0.10.1
Poppler Poppler 0.10.0
Poppler Poppler 0.7.1
Poppler Poppler 0.6.1
Poppler Poppler 0.3.1
Poppler Poppler 0.5.2
Poppler Poppler 0.5.91
Poppler Poppler 0.6.0
Poppler Poppler 0.3.3
Poppler Poppler 0.4.2
Poppler Poppler 0.10.4
Poppler Poppler 0.9.2
Poppler Poppler 0.6.4
Poppler Poppler 0.1.2
Poppler Poppler 0.8.0
Poppler Poppler 0.8.3
7.6
CVSSv2
CVE-2007-4352
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote malicious users to trigger memory corruption and execute arbitrary code via a crafted PDF file.
Xpdf Xpdf 3.0.1 Pl1
9.3
CVSSv2
CVE-2007-5392
Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote malicious users to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
Xpdf Xpdf 3.0.1 Pl1
9.3
CVSSv2
CVE-2007-5393
Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote malicious users to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.
Xpdf Xpdf 3.02p11
5
CVSSv2
CVE-2005-1920
The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x up to and including 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote malicious users to obtain sensitive information.
Kde Kde
Debian Debian Linux 3.1
4.6
CVSSv2
CVE-2004-0689
KDE prior to 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.
Kde Kde
Debian Debian Linux 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »