Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.0.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.1.3
Kde Kde 1.2
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.0.5a
Kde Kde 3.0.5b
Kde Kde 1.1
Kde Kde 2.1.1
NA
CVE-2003-0204
KDE 2 and KDE 3.1.1 and previous versions 3.x versions allows malicious users to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 2.0.1
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.0.5a
NA
CVE-2002-1393
Multiple vulnerabilities in KDE 2 and KDE 3.x up to and including 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote malicious users to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
Kde Kde 2.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0.1
Kde Kde 3.0.2
NA
CVE-2002-2333
Buffer overflow in konqueror in KDE 2.1 up to and including 3.0 and 3.0.2 allows remote malicious users to cause a denial of service (crash) via an IMG tag with large width and height attributes.
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 2.2.2
Kde Kde 3.0
NA
CVE-2002-1247
Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
Kde Klisa 2.2.2
Lisa Lisa 0.1
Lisa Lisa 0.1.2
Kde Kde 2.2
Kde Kde 3.0
Kde Kde 2.0
Kde Kde 2.1
Kde Kde 3.0.4
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.0.3a
NA
CVE-2002-1281
Unknown vulnerability in the rlogin KIO subsystem (rlogin.protocol) of KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and previous versions, allows local and remote malicious users to execute arbitrary code via a certain URL.
Kde Kde 2.2.1
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 2.1.2
Kde Kde 2.2
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 2.1
Kde Kde 2.1.1
Kde Kde 3.0.3
Kde Kde 3.0.4
NA
CVE-2002-1282
Unknown vulnerability in the telnet KIO subsystem (telnet.protocol) of KDE 2.x 2.1 and later allows local and remote malicious users to execute arbitrary code via a certain URL.
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 3.0.4
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 2.2.2
Kde Kde 3.0
NA
CVE-2002-1306
Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x prior to 3.0.4, allow (1) local and possibly remote malicious users to execute arbitrary code via the "lisa" daemon, and (2) remote malicious users to execute arbitrary code via a certain "...
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
NA
CVE-2002-0838
Buffer overflow in (1) gv 3.5.8 and previous versions, (2) gvv 1.0.2 and previous versions, (3) ggv 1.99.90 and previous versions, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and previous versions, allows malicious users to execute arbitrary code via a malformed (a) PDF...
Gv Gv 2.7.6
Gv Gv 2.7b1
Gv Gv 3.0.4
Gv Gv 3.1.4
Gv Gv 3.5.8
Ggv Ggv 1.0.2
Gv Gv 2.7b2
Gv Gv 2.7b3
Gv Gv 3.1.6
Gv Gv 3.2.4
Ghostview Ghostview 1.4.1
Ghostview Ghostview 1.5
Gv Gv 2.9.4
Gv Gv 3.0.0
Gv Gv 3.4.3
Gv Gv 3.5.2
Gv Gv 3.5.3
Ghostview Ghostview 1.3
Ghostview Ghostview 1.4
Gv Gv 2.7b4
Gv Gv 2.7b5
Gv Gv 3.4.12
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3