Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2013-2120
The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet prior to 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent malicious users to bypass authentication via a brute-force attack.
Kde Paste Applet
2.1
CVSSv2
CVE-2013-2213
The KRandom::random function in KDE Paste Applet after 4.10.5 in kdeplasma-addons uses the GNU C Library rand function's linear congruential generator, which makes it easier for context-dependent malicious users to defeat cryptographic protection mechanisms by predicting the...
Kde Paste Applet
6.8
CVSSv2
CVE-2012-4512
The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote malicious users to cause a denial of service (crash) and possibly read memory via a crafted font face source, related to "type confusion."
Kde Kde 4.7.3
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Eus 6.3
1 EDB exploit
7.8
CVSSv2
CVE-2013-4133
kde-workspace prior to 4.10.5 has a memory leak in plasma desktop
Kde Kde-workspace
Debian Debian Linux 8.0
5.5
CVSSv2
CVE-2019-5521
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x prior to 15.0.3 and 14.x prior to 14.1.6) and Fusion (11.x prior to 11.0.3 and 10.x prior to 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Su...
Vmware Workstation
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Fusion
1 Article
5.1
CVSSv2
CVE-2019-14744
In KDE Frameworks KConfig prior to 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Ico...
Kde Kconfig
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle 15.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 16.04
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
10
CVSSv2
CVE-2019-5684
NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access of an input texture array, which may lead to denial of service or code execution.
Nvidia Gpu Driver
1 Article
10
CVSSv2
CVE-2019-5685
NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access to a shader local temporary array, which may lead to denial of service or code execution.
Nvidia Gpu Driver
1 Article
4.3
CVSSv2
CVE-2019-1941
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote malicious user to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulne...
Cisco Identity Services Engine 2.4.0
Cisco Identity Services Engine
Cisco Identity Services Engine 2.4\\(0.902\\)
Cisco Identity Services Engine 2.5\\(0.225\\)
1 Article
4.3
CVSSv2
CVE-2019-1013
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0968, CVE-2019-0977, CVE-2019-1009, CVE-2019-1010, ...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »