Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.1 vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2005-3193
Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and previous versions, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted malicious u...
Xpdf Xpdf 0.93
Xpdf Xpdf 1.0
Xpdf Xpdf 1.0a
Xpdf Xpdf 3.0.1
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 0.90
Xpdf Xpdf 2.1
Xpdf Xpdf 2.2
Xpdf Xpdf 0.91
Xpdf Xpdf 0.92
Xpdf Xpdf 2.3
Xpdf Xpdf 3.0
Xpdf Xpdf 1.1
Xpdf Xpdf 2.0
Xpdf Xpdf 3.0 Pl3
5
CVSSv2
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
5
CVSSv2
CVE-2005-3624
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows malicious users to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integ...
Kde Kdegraphics 3.2
Kde Kdegraphics 3.4.3
Sgi Propack 3.0
Tetex Tetex 1.0.7
Libextractor Libextractor
Easy Software Products Cups 1.1.23
Easy Software Products Cups 1.1.23 Rc1
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Xpdf Xpdf 3.0
Conectiva Linux 10.0
Easy Software Products Cups 1.1.22
Easy Software Products Cups 1.1.22 Rc1
Kde Koffice 1.4.2
Kde Kpdf 3.2
Kde Kpdf 3.4.3
Tetex Tetex 2.0.2
Tetex Tetex 3.0
Kde Koffice 1.4
Kde Koffice 1.4.1
Tetex Tetex 2.0
Tetex Tetex 2.0.1
5
CVSSv2
CVE-2005-3626
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows malicious users to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
Easy Software Products Cups 1.1.22 Rc1
Easy Software Products Cups 1.1.23
Kde Kpdf 3.2
Kde Kpdf 3.4.3
Tetex Tetex 3.0
Xpdf Xpdf 3.0
Easy Software Products Cups 1.1.23 Rc1
Kde Kdegraphics 3.2
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Conectiva Linux 10.0
Libextractor Libextractor
Kde Kdegraphics 3.4.3
Kde Koffice 1.4
Sgi Propack 3.0
Tetex Tetex 1.0.7
Easy Software Products Cups 1.1.22
Kde Koffice 1.4.1
Kde Koffice 1.4.2
Tetex Tetex 2.0
Tetex Tetex 2.0.1
Tetex Tetex 2.0.2
5
CVSSv2
CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and previous versions allow remote malicious users to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.5.2
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2
Libtiff Libtiff 3.5.3
Libtiff Libtiff 3.5.4
Wxgtk2 Wxgtk2 2.5 .0
Libtiff Libtiff 3.5.5
Libtiff Libtiff 3.5.7
Libtiff Libtiff 3.4
Libtiff Libtiff 3.6.0
Libtiff Libtiff 3.6.1
Apple Mac Os X 10.2.4
Apple Mac Os X 10.2.5
Apple Mac Os X 10.3.4
Apple Mac Os X 10.3.5
Apple Mac Os X Server 10.2.5
Apple Mac Os X Server 10.2.6
Apple Mac Os X Server 10.3.4
Apple Mac Os X Server 10.3.5
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux 3.0
5
CVSSv2
CVE-2004-1145
Multiple vulnerabilities in Konqueror in KDE 3.3.1 and previous versions (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote malicious users to bypass sandbox restrict...
Ethereal Group Ethereal 0.10.1
Ethereal Group Ethereal 0.10.2
Ethereal Group Ethereal 0.9.1
Ethereal Group Ethereal 0.9.10
Ethereal Group Ethereal 0.9.3
Ethereal Group Ethereal 0.9.4
Conectiva Linux 10.0
Conectiva Linux 9.0
Ethereal Group Ethereal 0.10
Ethereal Group Ethereal 0.10.7
Ethereal Group Ethereal 0.9
Ethereal Group Ethereal 0.9.16
Ethereal Group Ethereal 0.9.2
Ethereal Group Ethereal 0.9.9
Sgi Propack 3.0
Ethereal Group Ethereal 0.10.3
Ethereal Group Ethereal 0.10.4
Ethereal Group Ethereal 0.9.11
Ethereal Group Ethereal 0.9.12
Ethereal Group Ethereal 0.9.13
Ethereal Group Ethereal 0.9.5
Ethereal Group Ethereal 0.9.6
5
CVSSv2
CVE-2002-2333
Buffer overflow in konqueror in KDE 2.1 up to and including 3.0 and 3.0.2 allows remote malicious users to cause a denial of service (crash) via an IMG tag with large width and height attributes.
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 2.2.2
Kde Kde 3.0
4.6
CVSSv2
CVE-2005-0078
The KDE screen saver in KDE prior to 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Debian Debian Linux 3.0
Kde Kde 1.0
Kde Kde 2.1 Beta2
Kde Kde 2.2
Kde Kde 3.0.4
Kde Kde 3.0 Beta 1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2.1
Kde Kde 2.2 Beta1
Kde Kde 3.0 Beta 2
Redhat Enterprise Linux 2.1
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 2.1
Kde Kde 2.1 Beta1
4.6
CVSSv2
CVE-2002-0838
Buffer overflow in (1) gv 3.5.8 and previous versions, (2) gvv 1.0.2 and previous versions, (3) ggv 1.99.90 and previous versions, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and previous versions, allows malicious users to execute arbitrary code via a malformed (a) PDF...
Gv Gv 2.7.6
Gv Gv 2.7b1
Gv Gv 3.0.4
Gv Gv 3.1.4
Gv Gv 3.5.8
Ggv Ggv 1.0.2
Gv Gv 2.7b2
Gv Gv 2.7b3
Gv Gv 3.1.6
Gv Gv 3.2.4
Ghostview Ghostview 1.4.1
Ghostview Ghostview 1.5
Gv Gv 2.9.4
Gv Gv 3.0.0
Gv Gv 3.4.3
Gv Gv 3.5.2
Gv Gv 3.5.3
Ghostview Ghostview 1.3
Ghostview Ghostview 1.4
Gv Gv 2.7b4
Gv Gv 2.7b5
Gv Gv 3.4.12
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3