Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 1.1.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0460
Buffer overflow in KDE kdesud on Linux allows local uses to gain privileges via a long DISPLAY environmental variable.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 1.2
1 EDB exploit
NA
CVE-2000-0530
The KApplication class in the KDE 1.1.2 configuration file management capability allows local users to overwrite arbitrary files.
Caldera Openlinux 2.4
Kde Kde 1.1.2
3 EDB exploits
NA
CVE-2003-0690
KDM in KDE 3.1.3 and previous versions does not verify whether the pam_setcred function call succeeds, which may allow malicious users to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 2.1.1
Kde Kde 2.1.2
Kde Kde 3.0.3a
Kde Kde 3.0.4
Kde Kde 3.1.2
Kde Kde 3.1.3
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 3.0.5b
Kde Kde 3.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.2
Kde Kde 3.0.3
Kde Kde 3.1.1
Kde Kde 3.1.1a
Kde Kde 1.1.2
Kde Kde 1.2
NA
CVE-2003-0692
KDM in KDE 3.1.3 and previous versions uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows malicious users to guess session cookies via brute force methods and gain access to the user session.
Kde Kde 2.0.1
Kde Kde 2.0 Beta
Kde Kde 2.1
Kde Kde 3.0.1
Kde Kde 3.0.2
Kde Kde 3.1
Kde Kde 3.1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2
Kde Kde 2.2.1
Kde Kde 3.0.4
Kde Kde 3.0.5
Kde Kde 3.1.3
Kde Kde 1.2
Kde Kde 2.0
Kde Kde 2.2.2
Kde Kde 3.0
Kde Kde 3.0.5a
Kde Kde 3.0.5b
Kde Kde 1.1
Kde Kde 2.1.1
NA
CVE-2005-0078
The KDE screen saver in KDE prior to 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Debian Debian Linux 3.0
Kde Kde 1.0
Kde Kde 2.1 Beta2
Kde Kde 2.2
Kde Kde 3.0.4
Kde Kde 3.0 Beta 1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Linux Advanced Workstation 2.1
Kde Kde 1.1
Kde Kde 1.1.1
Kde Kde 1.1.2
Kde Kde 2.2.1
Kde Kde 2.2 Beta1
Kde Kde 3.0 Beta 2
Redhat Enterprise Linux 2.1
Kde Kde 2.0
Kde Kde 2.0.1
Kde Kde 3.0
Kde Kde 3.0.1
Kde Kde 2.1
Kde Kde 2.1 Beta1
NA
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
NA
CVE-2000-0918
Format string vulnerability in kvt in KDE 1.1.2 may allow local users to execute arbitrary commands via a DISPLAY environmental variable that contains formatting characters.
Kde Kvt 1.1.2
NA
CVE-2009-1698
WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 3.0.1b
Apple Safari 3.1.2
Apple Safari 3.1.1
Apple Safari 3.0.2b
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 2.0
Apple Safari
Apple Safari 3.0.0b
Apple Safari 3.2.0
Apple Safari 3.0.3b
Apple Safari 3.0.3
Apple Safari 2.0.0
NA
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 3.1.1
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 1.3.2
Apple Safari 2.0
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 0.8
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.0.4
Apple Safari 1.3
Apple Safari 1.3.1
Apple Safari
Apple Safari 3.0.2
Apple Safari 1.1
Apple Safari 1.2
Apple Safari 3.2.1
Apple Safari 3.2.3
Apple Safari 1.0.3
NA
CVE-2009-1725
WebKit in Apple Safari prior to 4.0.2, as used on iPhone OS prior to 3.1, iPhone OS prior to 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.1.1
Apple Safari 3.1.0b
Apple Safari 3.0.2
Apple Safari 4.0.0b
Apple Safari 3.1.0
Apple Safari 4.0
Apple Safari 3.2.2
Apple Safari 3.0.3b
Apple Safari 3.0.0b
Apple Safari 3.1.2
Apple Safari 3.0.3
Apple Safari 2.0.4
Apple Safari 2.0.0
Apple Safari 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started