Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.0 Beta
Kde Kde 2.2
Kde Kde 3.1.1a
Kde Kde 2.0.1
Kde Kde 3.0.5b
Kde Kde 3.1.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.5a
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 1.1.2
Kde Kde 1.1.1
Kde Kde 3.1.3
Kde Kde 2.2.2
Kde Kde 3.1
7.5
CVSSv2
CVE-2003-0204
KDE 2 and KDE 3.1.1 and previous versions 3.x versions allows malicious users to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.2
Kde Kde 2.0.1
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.5a
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.1
Kde Kde 3.0.3
Kde Kde 3.1.1
Kde Kde 3.0.3a
7.5
CVSSv2
CVE-2002-1393
Multiple vulnerabilities in KDE 2 and KDE 3.x up to and including 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote malicious users to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.2
Kde Kde 2.0.1
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
5
CVSSv2
CVE-2002-2333
Buffer overflow in konqueror in KDE 2.1 up to and including 3.0 and 3.0.2 allows remote malicious users to cause a denial of service (crash) via an IMG tag with large width and height attributes.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
7.5
CVSSv2
CVE-2002-1281
Unknown vulnerability in the rlogin KIO subsystem (rlogin.protocol) of KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and previous versions, allows local and remote malicious users to execute arbitrary code via a certain URL.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.0.3
7.5
CVSSv2
CVE-2002-1282
Unknown vulnerability in the telnet KIO subsystem (telnet.protocol) of KDE 2.x 2.1 and later allows local and remote malicious users to execute arbitrary code via a certain URL.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.0.3
7.5
CVSSv2
CVE-2002-1306
Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x prior to 3.0.4, allow (1) local and possibly remote malicious users to execute arbitrary code via the "lisa" daemon, and (2) remote malicious users to execute arbitrary code via a certain "...
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.0.3
7.2
CVSSv2
CVE-2002-1247
Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
Kde Klisa 2.2.2
Lisa Lisa 0.1
Lisa Lisa 0.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 3.0.3
Kde Kde 3.0.3a
4.6
CVSSv2
CVE-2002-0838
Buffer overflow in (1) gv 3.5.8 and previous versions, (2) gvv 1.0.2 and previous versions, (3) ggv 1.99.90 and previous versions, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and previous versions, allows malicious users to execute arbitrary code via a malformed (a) PDF...
Gv Gv 3.4.2
Ghostview Ghostview 1.5
Gv Gv 3.5.2
Gv Gv 3.1.4
Gv Gv 3.4.12
Gv Gv 2.7b4
Gv Gv 3.5.3
Gv Gv 3.2.4
Gv Gv 2.9.4
Gv Gv 2.7b1
Ghostview Ghostview 1.4.1
Gv Gv 2.7b5
Gv Gv 3.1.6
Ggv Ggv 1.0.2
Gv Gv 2.7.6
Gv Gv 3.0.0
Ghostview Ghostview 1.3
Gv Gv 3.0.4
Gv Gv 3.4.3
Gv Gv 2.7b3
Gv Gv 3.5.8
Gv Gv 2.7b2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3