Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kde 4.0.0 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2010-2451
Multiple format string vulnerabilities in the DCC functionality in KVIrc 3.4 and 4.0 have unspecified impact and remote attack vectors.
Kvirc Kvirc 3.4.0
Kvirc Kvirc 4.0
828
VMScore
CVE-2010-2452
Directory traversal vulnerability in the DCC functionality in KVIrc 3.4 and 4.0 allows remote malicious users to overwrite arbitrary files via unknown vectors.
Kvirc Kvirc 4.0
Kvirc Kvirc 3.4.0
828
VMScore
CVE-2008-1670
Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.
Kde Kde 4.0.0
Kde Kde 4.0.3
Kde Kde 4.0.1
Kde Kde 4.0.2
655
VMScore
CVE-2010-2785
The IRC Protocol component in KVIrc 3.x and 4.x before r4693 does not properly handle \ (backslash) characters, which allows remote authenticated users to execute arbitrary CTCP commands via vectors involving \r and \40 sequences, a different vulnerability than CVE-2010-2451 and ...
Kvirc Kvirc 4.0.2
Kvirc Kvirc 3.0.0
Kvirc Kvirc 3.4.0
Kvirc Kvirc 3.0.1
Kvirc Kvirc 4.0.0
Kvirc Kvirc 3.4.2
1 EDB exploit
570
VMScore
CVE-2010-1511
KGet 2.4.2 in KDE SC 4.0.0 up to and including 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote malicious users to overwrite arbitrary files via a crafted metalink file.
Kde Kget 2.4.2
Kde Kde Sc 4.3.5
Kde Kde Sc 4.3.4
Kde Kde Sc 4.0.1
Kde Kde Sc 2.2.0
Kde Kde Sc 4.1.0
Kde Kde Sc 4.1.80
Kde Kde Sc 4.4.3
Kde Kde Sc 4.2.3
Kde Kde Sc 4.1.1
Kde Kde Sc 4.4.0
Kde Kde Sc 3.5.10
Kde Kde Sc 4.4.1
Kde Kde Sc 4.0.0
Kde Kde Sc 4.1.96
Kde Kde Sc 4.1.85
Kde Kde Sc 4.2.1
Kde Kde Sc 4.2.0
Kde Kde Sc 4.2.4
Kde Kde Sc 4.4.2
Kde Kde Sc 4.3.0
Kde Kde Sc 4.2.2
516
VMScore
CVE-2011-1586
Directory traversal vulnerability in the KGetMetalink::File::isValidNameAttr function in ui/metalinkcreator/metalinker.cpp in KGet in KDE SC 4.6.2 and previous versions allows remote malicious users to create arbitrary files via a .. (dot dot) in the name attribute of a file elem...
Kde Kde Sc 4.1.0
Kde Kde Sc 4.0.3
Kde Kde Sc 4.0.5
Kde Kde Sc 4.5.2
Kde Kde Sc 4.3.0
Kde Kde Sc 4.0.0
Kde Kde Sc 4.2.3
Kde Kde Sc 4.1.3
Kde Kde Sc 4.4.0
Kde Kde Sc 4.6
Kde Kde Sc 4.5.4
Kde Kde Sc 4.2
Kde Kde Sc 4.4.1
Kde Kde Sc 4.2.2
Kde Kde Sc 4.4.2
Kde Kde Sc 4.5.5
Kde Kde Sc 4.5.1
Kde Kde Sc 2.2.0
Kde Kde Sc 4.1.2
Kde Kde Sc 4.2.1
Kde Kde Sc 4.4.3
Kde Kde Sc 4.3.5
516
VMScore
CVE-2010-1000
Directory traversal vulnerability in KGet in KDE SC 4.0.0 up to and including 4.4.3 allows remote malicious users to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
Kde Kde Sc 4.3.0
Kde Kde Sc 4.4.0
Kde Kde Sc 4.1.80
Kde Kde Sc 4.1.85
Kde Kde Sc 4.1.1
Kde Kde Sc 4.2.2
Kde Kde Sc 4.0.0
Kde Kde Sc 4.0.4
Kde Kde Sc 4.0.5
Kde Kde Sc 4.3.4
Kde Kde Sc 4.3.5
Kde Kde Sc 4.4.2
Kde Kde Sc 4.4.3
Kde Kde Sc 4.1.3
Kde Kde Sc 4.1.2
Kde Kde Sc 4.0.2
Kde Kde Sc 4.0.3
Kde Kde Sc 4.1.0
Kde Kde Sc 4.2.4
Kde Kde Sc 4.3.2
Kde Kde Sc 4.3.3
Kde Kde Sc 4.4.1
505
VMScore
CVE-2012-4514
rendering/render_replaced.cpp in Konqueror in KDE prior to 4.9.3 allows remote malicious users to cause a denial of service (NULL pointer dereference) via a crafted web page, related to "trying to reuse a frame with a null part."
Kde Kde 3.2.1
Kde Kde 3.2.3
Kde Kde 3.1.1
Kde Kde 3.1.2
Kde Kde 3.5
Kde Kde 3.3.x
Kde Kde 1.1
Kde Kde 4.7.3
Kde Kde 2.2
Kde Kde 1.x
Kde Kde 3.5.7
Kde Kde 2.0.1
Kde Kde 3.0.5
Kde Kde 3.1 Beta2
Kde Kde 3.0.1
Kde Kde 3.0
Kde Kde 3.0.2
Kde Kde
Kde Kde 3.1.5
Kde Kde 3.1.4
Kde Kde 3.2.0
Kde Kde 3.2
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started