Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.0.2 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-1224
Directory traversal vulnerability in kpf for KDE 3.0.1 through KDE 3.0.3a allows remote malicious users to read arbitrary files as the kpf user via a URL with a modified icon parameter.
Kde Kde 3.0.2
Kde Kde 3.0.1
Kde Kde 3.0.3
Kde Kde 3.0.3a
1 EDB exploit
4.6
CVSSv2
CVE-2005-0078
The KDE screen saver in KDE prior to 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Kde Kde 2.2.1
Kde Kde 3.0 Beta 1
Kde Kde 2.0
Kde Kde 3.0.2
Redhat Enterprise Linux Desktop 3.0
Kde Kde 2.2
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Kde Kde 2.0.1
Kde Kde 2.2 Beta1
Debian Debian Linux 3.0
Kde Kde 2.1
Kde Kde 3.0.1
Redhat Linux Advanced Workstation 2.1
Kde Kde 2.1 Beta2
Kde Kde 3.0 Beta 2
Kde Kde 3.0.4
Kde Kde 3.0
Kde Kde 1.1.2
Kde Kde 1.1.1
Kde Kde 1.1
Kde Kde 1.0
2.6
CVSSv2
CVE-2006-3672
KDE Konqueror 3.5.1 and previous versions allows remote malicious users to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argumen...
Kde Konqueror 3.2.2.6
Kde Konqueror 3.1.2
Kde Konqueror 3.0.2
Kde Konqueror 3.3
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.0
Kde Konqueror 3.3.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.3
Kde Konqueror 3.1.1
Kde Konqueror 2.1.2
Kde Konqueror
Kde Konqueror 3.2.3
Kde Konqueror 3.0.5b
Kde Konqueror 2.2.1
Kde Konqueror 3.1.3
Kde Konqueror 3.3.2
Kde Konqueror 3.1.4
Kde Konqueror 3.2.1
Kde Konqueror 3.1.5
Kde Konqueror 3.2.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4