Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kdelibs vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-0537
The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote malicious users to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title t...
Kde Konqueror 3.5.5
NA
CVE-2007-4224
KDE Konqueror 3.5.7 allows remote malicious users to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
Kde Konqueror 3.5.7
NA
CVE-2007-3820
konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote malicious users to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
Kde Konqueror 3.5.7
NA
CVE-2007-4225
Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote malicious users to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion.
Kde Konqueror 3.5.7
NA
CVE-2003-0592
Konqueror in KDE 3.1.3 and previous versions (kdelibs) allows remote malicious users to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outsi...
Kde Konqueror 2.1.1
Kde Konqueror 3.1
Kde Konqueror 3.1.1
Kde Konqueror 2.2.2
Kde Konqueror 3.0
Kde Konqueror 3.1.2
Kde Konqueror Embedded 0.1
Kde Konqueror 3.0.3
Kde Konqueror 3.0.5
Kde Konqueror 3.0.1
Kde Konqueror 3.0.2
NA
CVE-2007-1308
ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote malicious users to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.
Kde Konqueror 3.5.5
1 EDB exploit
8.8
CVSSv3
CVE-2012-4512
The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote malicious users to cause a denial of service (crash) and possibly read memory via a crafted font face source, related to "type confusion."
Kde Kde 4.7.3
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Eus 6.3
1 EDB exploit
NA
CVE-2007-1564
The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
Kde Konqueror 3.5.5
1 EDB exploit
7.8
CVSSv3
CVE-2019-14744
In KDE Frameworks KConfig prior to 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Ico...
Kde Kconfig
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Backports Sle 15.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 16.04
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
NA
CVE-2006-4811
Integer overflow in Qt 3.3 prior to 3.3.7, 4.1 prior to 4.1.5, and 4.2 prior to 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafte...
Qt Qt 3.3.5
Qt Qt 3.3.6
Qt Qt 3.3.3
Qt Qt 3.3.4
Qt Qt 4.1.0
Qt Qt 4.2.0
Qt Qt 3.3.1
Qt Qt 3.3.2
Qt Qt 4.1.2
Qt Qt 4.1.1
Redhat Kdelibs 3.1.3
Qt Qt 3.3.0
Qt Qt 4.1.4
Qt Qt 4.1.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »