Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 3.1 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.3.2
Kde Kde 2.2.1
Kde Kde 3.0 Beta 1
Kde Kde 2.1.2
Kde Kde 2.0
Kde Kde 4.0.3
Kde Kde 4.0.2
Kde Kde 3.0.2
Kde Kde 3.0.5
Kde Kde 2.0 Beta
Kde Kde 2.2
Kde Kde 3.2.0 Beta1
Kde Kde 3.3.1
Kde Kde 3.1.1a
Kde Kde 3.5.5
Kde Kde 2.0.1
Kde Kde 2.2 Beta1
Kde Kde 3.2.2
Kde Kde 3.2.1
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.4.3
1 EDB exploit
828
VMScore
CVE-2009-1725
WebKit in Apple Safari prior to 4.0.2, as used on iPhone OS prior to 3.1, iPhone OS prior to 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allow...
Apple Safari 3.0.4b
Apple Safari 2.0.3
Apple Safari
Apple Safari 3.0.4
Apple Safari 3.0.1
Apple Safari 2.0.1
Apple Safari 2.0.2
Apple Safari 3.0.0
Apple Safari 3.0.2
Apple Safari 3.0.3b
Apple Safari 3.1.1
Apple Safari 3.0.3
Apple Safari 2.0
Apple Safari 3.1.2
Apple Safari 3.1.0b
Apple Safari 3.1.0
Apple Safari 2.0.4
Apple Safari 3.2.2
Apple Safari 3.0.0b
Apple Safari 4.0
Apple Safari 4.0.0b
Apple Safari 2.0.0
828
VMScore
CVE-2009-1709
Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari prior to 4.0 allows remote malicious users to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, relat...
Apple Safari 3.1.2
Apple Safari 3.2.1
Apple Safari 0.9
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari 3.0.4
Apple Safari 3.0.3
Apple Safari 1.3.1
Apple Safari 2.0.4
Apple Safari 3.0
Apple Safari 3.2.3
Apple Safari 1.1
Apple Safari
Apple Safari 3.1
Apple Safari 2.0
Apple Safari 3.0.2
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 2.0.2
Apple Safari 3.1.1
Apple Safari 1.3
Apple Safari 0.8
828
VMScore
CVE-2009-1687
The JavaScript garbage collector in WebKit in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, and iPhone OS for iPod touch 1.1 up to and including 2.2.1 does not properly handle allocation failures, which allows remote malicious users to execute arbitrary code...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
828
VMScore
CVE-2009-1690
Use-after-free vulnerability in WebKit, as used in Apple Safari prior to 4.0, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote malicious users to execute arbitrary...
Apple Safari 1.1
Apple Safari 1.3.1
Apple Safari 3.2.3
Apple Safari 2.0.2
Apple Safari 3.1
Apple Safari 3.1.2
Apple Safari 3.0
Apple Safari 0.8
Apple Safari 2.0
Apple Safari 3.0.4
Apple Safari 0.9
Apple Safari 3.0.3
Apple Safari 1.3.2
Apple Safari 1.2
Apple Safari
Apple Safari 3.2.1
Apple Safari 3.0.2
Apple Safari 2.0.4
Apple Safari 3.1.1
Apple Safari 1.0.3
Apple Safari 1.0
Apple Safari 1.3
828
VMScore
CVE-2009-0945
Array index error in the insertItemBefore method in WebKit, as used in Apple Safari prior to 3.2.3 and 4 Public Beta, iPhone OS 1.0 up to and including 2.2.1, iPhone OS for iPod touch 1.1 up to and including 2.2.1, Google Chrome Stable prior to 1.0.154.65, and possibly other prod...
Apple Safari
Apple Safari 0.8
Apple Safari 0.9
Apple Safari 1.0
Apple Safari 1.0.0
Apple Safari 1.0.0b1
Apple Safari 1.0.0b2
Apple Safari 1.0.1
Apple Safari 1.0.2
Apple Safari 1.0.3
Apple Safari 1.1
Apple Safari 1.1.0
Apple Safari 1.1.1
Apple Safari 1.2
Apple Safari 1.2.0
Apple Safari 1.2.1
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2.4
Apple Safari 1.2.5
Apple Safari 1.3
Apple Safari 1.3.0
265
VMScore
CVE-2006-3672
KDE Konqueror 3.5.1 and previous versions allows remote malicious users to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argumen...
Kde Konqueror 3.2.2.6
Kde Konqueror 3.1.2
Kde Konqueror 3.0.2
Kde Konqueror 3.3
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.0
Kde Konqueror 3.3.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.3
Kde Konqueror 3.1.1
Kde Konqueror 2.1.2
Kde Konqueror
Kde Konqueror 3.2.3
Kde Konqueror 3.0.5b
Kde Konqueror 2.2.1
Kde Konqueror 3.1.3
Kde Konqueror 3.3.2
Kde Konqueror 3.1.4
Kde Konqueror 3.2.1
Kde Konqueror 3.1.5
Kde Konqueror 3.2.2
1 EDB exploit
676
VMScore
CVE-2006-1244
Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPa...
Xpdf Xpdf 2.0
Libextractor Libextractor 0.3.11
Xpdf Xpdf 3.0 Pl3
Xpdf Xpdf 1.0
Libextractor Libextractor 0.4.1
Libextractor Libextractor 0.4.2
Xpdf Xpdf 3.0.1 Pl1
Xpdf Xpdf 0.91
Libextractor Libextractor 0.4
Libextractor Libextractor 0.3.8
Xpdf Xpdf 2.3
Xpdf Xpdf 0.92
Xpdf Xpdf 3.0.1
Gnome Gpdf 2.8.2
Xpdf Xpdf 1.0a
Libextractor Libextractor 0.3.9
Xpdf Xpdf 2.2
Xpdf Xpdf 3.0 Pl2
Xpdf Xpdf 2.1
Xpdf Xpdf 0.90
Xpdf Xpdf 3.0
Libextractor Libextractor 0.5
570
VMScore
CVE-2005-4684
Konqueror can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote malicious users to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, ...
Kde Konqueror 3.2.2.6
Kde Konqueror 3.1.2
Kde Konqueror 3.0.2
Kde Konqueror 3.3
Kde Konqueror 2.2.2
Kde Konqueror 3.1
Kde Konqueror 3.0
Kde Konqueror 3.3.1
Kde Konqueror 3.0.1
Kde Konqueror 3.0.3
Kde Konqueror 3.1.1
Kde Konqueror 2.1.2
Kde Konqueror 3.2.3
Kde Konqueror 3.0.5b
Kde Konqueror 2.2.1
Kde Konqueror 3.1.3
Kde Konqueror 0.1
Kde Konqueror 3.3.2
Kde Konqueror 3.1.4
Kde Konqueror 3.2.1
Kde Konqueror 3.1.5
Kde Konqueror 2.1.1
445
VMScore
CVE-2005-3624
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows malicious users to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integ...
Easy Software Products Cups 1.1.22
Kde Kpdf 3.4.3
Kde Kdegraphics 3.4.3
Tetex Tetex 3.0
Kde Koffice 1.4.1
Kde Kword 1.4.2
Poppler Poppler 0.4.2
Tetex Tetex 1.0.7
Sgi Propack 3.0
Easy Software Products Cups 1.1.23 Rc1
Kde Kdegraphics 3.2
Kde Koffice 1.4.2
Libextractor Libextractor
Easy Software Products Cups 1.1.22 Rc1
Xpdf Xpdf 3.0
Tetex Tetex 2.0.2
Tetex Tetex 2.0.1
Conectiva Linux 10.0
Kde Kpdf 3.2
Easy Software Products Cups 1.1.23
Kde Koffice 1.4
Tetex Tetex 2.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »