Show filters
118 Total Results
Displaying 111-118 of 118
Sort by:
Attacker Value
Unknown
CVE-1999-0781
Disclosure Date: November 18, 1998 (last updated February 22, 2025)
KDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables.
0
Attacker Value
Unknown
CVE-1999-0780
Disclosure Date: November 18, 1998 (last updated February 22, 2025)
KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file.
0
Attacker Value
Unknown
CVE-1999-1107
Disclosure Date: November 18, 1998 (last updated February 22, 2025)
Buffer overflow in kppp in KDE allows local users to gain root access via a long PATH environmental variable.
0
Attacker Value
Unknown
CVE-1999-1270
Disclosure Date: July 11, 1998 (last updated February 22, 2025)
KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps.
0
Attacker Value
Unknown
CVE-1999-1096
Disclosure Date: May 16, 1998 (last updated February 22, 2025)
Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable.
0
Attacker Value
Unknown
CVE-1999-1106
Disclosure Date: April 29, 1998 (last updated February 22, 2025)
Buffer overflow in kppp in KDE allows local users to gain root access via a long -c (account_name) command line argument.
0
Attacker Value
Unknown
CVE-1999-1269
Disclosure Date: February 06, 1998 (last updated February 22, 2025)
Screen savers in KDE beta 3 allows local users to overwrite arbitrary files via a symlink attack on the .kss.pid file.
0
Attacker Value
Unknown
CVE-1999-1267
Disclosure Date: May 05, 1997 (last updated February 22, 2025)
KDE file manager (kfm) uses a TCP server for certain file operations, which allows remote attackers to modify arbitrary files by sending a copy command to the server.
0