Filtered by vendor Kde
Subscribe
Total
195 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-28117 | 1 Kde | 1 Discover | 2024-10-15 | 5.0 MEDIUM | 7.5 HIGH |
libdiscover/backends/KNSBackend/KNSResource.cpp in KDE Discover before 5.21.3 automatically creates links to potentially dangerous URLs (that are neither https:// nor http://) based on the content of the store.kde.org web site. (5.18.7 is also a fixed version.) | |||||
CVE-2024-1433 | 1 Kde | 1 Plasma-workspace | 2024-09-05 | 2.6 LOW | 3.7 LOW |
A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user's home or the installation of third party global themes. | |||||
CVE-2024-36041 | 1 Kde | 1 Plasma-workspace | 2024-07-09 | N/A | 7.8 HIGH |
KSmserver in KDE Plasma Workspace (aka plasma-workspace) before 5.27.11.1 and 6.x before 6.0.5.1 allows connections via ICE based purely on the host, i.e., all local connections are accepted. This allows another user on the same machine to gain access to the session manager, e.g., use the session-restore feature to execute arbitrary code as the victim (on the next boot) via earlier use of the /tmp directory. | |||||
CVE-2022-23853 | 1 Kde | 2 Kate, Ktexteditor | 2024-02-28 | 6.8 MEDIUM | 7.8 HIGH |
The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory. | |||||
CVE-2022-24986 | 1 Kde | 1 Kcron | 2024-02-28 | 4.6 MEDIUM | 7.8 HIGH |
KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands. | |||||
CVE-2021-38373 | 1 Kde | 1 Kmail | 2024-02-28 | 3.5 LOW | 5.3 MEDIUM |
In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked. | |||||
CVE-2021-38372 | 1 Kde | 1 Trojita | 2024-02-28 | 4.3 MEDIUM | 3.7 LOW |
In KDE Trojita 0.7, man-in-the-middle attackers can create new folders because untagged responses from an IMAP server are accepted before STARTTLS. | |||||
CVE-2021-31855 | 1 Kde | 1 Messagelib | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
KDE Messagelib through 5.17.0 reveals cleartext of encrypted messages in some situations. Deleting an attachment of a decrypted encrypted message stored on a remote server (e.g., an IMAP server) causes KMail to upload the decrypted content of the message to the remote server. With a crafted message, a user could be tricked into decrypting an encrypted message and then deleting an attachment attached to this message. If the attacker has access to the messages stored on the email server, then the attacker could read the decrypted content of the encrypted message. This occurs in ViewerPrivate::deleteAttachment in messageviewer/src/viewer/viewer_p.cpp. | |||||
CVE-2021-36083 | 1 Kde | 1 Kimageformats | 2024-02-28 | 4.3 MEDIUM | 5.5 MEDIUM |
KDE KImageFormats 5.70.0 through 5.81.0 has a stack-based buffer overflow in XCFImageFormat::loadTileRLE. | |||||
CVE-2020-26164 | 2 Kde, Opensuse | 3 Kdeconnect, Backports Sle, Leap | 2024-02-28 | 4.9 MEDIUM | 5.5 MEDIUM |
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack. | |||||
CVE-2020-27187 | 1 Kde | 1 Partition Manager | 2024-02-28 | 7.2 HIGH | 7.8 HIGH |
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges. | |||||
CVE-2020-11880 | 1 Kde | 1 Kmail | 2024-02-28 | 6.4 MEDIUM | 6.5 MEDIUM |
An issue was discovered in KDE KMail before 19.12.3. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make KMail attach local files to a composed email message without showing a warning to the user, as demonstrated by an attach=.bash_history value. | |||||
CVE-2020-15954 | 2 Debian, Kde | 2 Debian Linux, Kmail | 2024-02-28 | 4.3 MEDIUM | 6.5 MEDIUM |
KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communication during times when the UI indicates that encryption is in use. | |||||
CVE-2020-16116 | 5 Canonical, Debian, Fedoraproject and 2 more | 5 Ubuntu Linux, Debian Linux, Fedora and 2 more | 2024-02-28 | 4.3 MEDIUM | 3.3 LOW |
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal. | |||||
CVE-2020-9359 | 3 Debian, Fedoraproject, Kde | 3 Debian Linux, Fedora, Okular | 2024-02-28 | 6.8 MEDIUM | 5.3 MEDIUM |
KDE Okular before 1.10.0 allows code execution via an action link in a PDF document. | |||||
CVE-2020-13152 | 1 Kde | 1 Amarok | 2024-02-28 | 4.3 MEDIUM | 5.5 MEDIUM |
A remote user can create a specially crafted M3U file, media playlist file that when loaded by the target user, will trigger a memory leak, whereby Amarok 2.8.0 continue to waste resources over time, eventually allows attackers to cause a denial of service. | |||||
CVE-2018-19516 | 1 Kde | 1 Kde Applications | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
messagepartthemes/default/defaultrenderer.cpp in messagelib in KDE Applications before 18.12.0 does not properly restrict the handling of an http-equiv="REFRESH" value. | |||||
CVE-2020-24654 | 5 Canonical, Debian, Fedoraproject and 2 more | 5 Ubuntu Linux, Debian Linux, Fedora and 2 more | 2024-02-28 | 4.3 MEDIUM | 3.3 LOW |
In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory. | |||||
CVE-2020-12755 | 1 Kde | 1 Kio-extras | 2024-02-28 | 2.1 LOW | 3.3 LOW |
fishProtocol::establishConnection in fish/fish.cpp in KDE kio-extras through 20.04.0 makes a cacheAuthentication call even if the user had not set the keepPassword option. This may lead to unintended KWallet storage of a password. | |||||
CVE-2013-2213 | 1 Kde | 1 Paste Applet | 2024-02-28 | 2.1 LOW | 5.5 MEDIUM |
The KRandom::random function in KDE Paste Applet after 4.10.5 in kdeplasma-addons uses the GNU C Library rand function's linear congruential generator, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the generator output. |