Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.2.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-1282
Unknown vulnerability in the telnet KIO subsystem (telnet.protocol) of KDE 2.x 2.1 and later allows local and remote malicious users to execute arbitrary code via a certain URL.
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.0.3
7.5
CVSSv2
CVE-2002-1306
Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x prior to 3.0.4, allow (1) local and possibly remote malicious users to execute arbitrary code via the "lisa" daemon, and (2) remote malicious users to execute arbitrary code via a certain "...
Kde Kde 2.2.1
Kde Kde 2.1.2
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.2.2
Kde Kde 3.0.3
7.2
CVSSv2
CVE-2002-1247
Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
Kde Klisa 2.2.2
Lisa Lisa 0.1
Lisa Lisa 0.1.2
Kde Kde 2.0
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 3.0.3
Kde Kde 3.0.3a
7.5
CVSSv2
CVE-2002-1151
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 up to and including 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote malicious users to execute script and steal cookies from subframes that are in other dom...
Kde Konqueror 3.0.2
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Konqueror 3.0.3
Kde Kde 3.0.2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 2.2.2
Kde Kde 3.0.3
4.6
CVSSv2
CVE-2002-0838
Buffer overflow in (1) gv 3.5.8 and previous versions, (2) gvv 1.0.2 and previous versions, (3) ggv 1.99.90 and previous versions, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and previous versions, allows malicious users to execute arbitrary code via a malformed (a) PDF...
Gv Gv 3.4.2
Ghostview Ghostview 1.5
Gv Gv 3.5.2
Gv Gv 3.1.4
Gv Gv 3.4.12
Gv Gv 2.7b4
Gv Gv 3.5.3
Gv Gv 3.2.4
Gv Gv 2.9.4
Gv Gv 2.7b1
Ghostview Ghostview 1.4.1
Gv Gv 2.7b5
Gv Gv 3.1.6
Ggv Ggv 1.0.2
Gv Gv 2.7.6
Gv Gv 3.0.0
Ghostview Ghostview 1.3
Gv Gv 3.0.4
Gv Gv 3.4.3
Gv Gv 2.7b3
Gv Gv 3.5.8
Gv Gv 2.7b2
2 EDB exploits
7.5
CVSSv2
CVE-2002-0970
The SSL capability for Konqueror in KDE 3.0.2 and previous versions does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote malicious users to spoof the certificates of trusted sites via a man-in-the-middle attack.
Kde Konqueror 3.0.2
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.0.1
Kde Kde 3.0.2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 2.2.2
4.6
CVSSv2
CVE-2001-1197
klprfax_filter in KDE2 KDEUtils allows local users to overwrite arbitrary files via a symlink attack on the klprfax.filter temporary file.
Kde Kdeutils 2.2
Kde Kdeutils 2.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3