Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.5.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-0019
Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 up to and including 3.5.0 allows remote malicious users to execute arbitrary code via a crafted, UTF-8 encoded URI.
Kde Kde 3.2.0 Beta1
Kde Kde 3.2.1
Kde Kde 3.3.2
Kde Kde 3.3.x
Kde Kde 3.2.x
Kde Kde 3.3
Kde Kde 3.4.1
Kde Kde 3.4.2
Kde Kde 3.2
Kde Kde 3.2.0
Kde Kde 3.3.0
Kde Kde 3.3.1
Kde Kde 3.5.0
Kde Kde 3.2.2
Kde Kde 3.2.3
Kde Kde 3.4
Kde Kde 3.4.0
6.8
CVSSv2
CVE-2007-4569
backend/session.c in KDM in KDE 3.3.0 up to and including 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote malicious users to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
Kde Kde 3.4.0
Kde Kde 3.4.1
Kde Kde 3.5.3
Kde Kde 3.5.4
Kde Kde 3.3.1
Kde Kde 3.3.2
Kde Kde 3.4
Kde Kde 3.5.1
Kde Kde 3.5.2
Kde Kde 3.4.2
Kde Kde 3.4.3
Kde Kde 3.5.5
Kde Kde 3.5.6
Kde Kde 3.3
Kde Kde 3.3.0
Kde Kde 3.5
Kde Kde 3.5.0
Kde Kde 3.5.7
5
CVSSv2
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started