Show filters
210 Total Results
Displaying 41-50 of 210
Sort by:
Attacker Value
Unknown
CVE-2019-7443
Disclosure Date: May 07, 2019 (last updated November 08, 2023)
KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.
0
Attacker Value
Unknown
CVE-2019-10732
Disclosure Date: April 07, 2019 (last updated November 27, 2024)
In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
0
Attacker Value
Unknown
CVE-2018-19120
Disclosure Date: November 29, 2018 (last updated November 08, 2023)
The HTML thumbnailer plugin in KDE Applications before 18.12.0 allows attackers to trigger outbound TCP connections to arbitrary IP addresses, leading to disclosure of the source IP address.
0
Attacker Value
Unknown
CVE-2018-1000801
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
okular version 18.08 and earlier contains a Directory Traversal vulnerability in function "unpackDocumentArchive(...)" in "core/document.cpp" that can result in Arbitrary file creation on the user workstation. This attack appear to be exploitable via he victim must open a specially crafted Okular archive. This issue appears to have been corrected in version 18.08.1
0
Attacker Value
Unknown
CVE-2017-17689
Disclosure Date: May 16, 2018 (last updated November 26, 2024)
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
0
Attacker Value
Unknown
CVE-2018-10380
Disclosure Date: May 08, 2018 (last updated November 26, 2024)
kwallet-pam in KDE KWallet before 5.12.6 allows local users to obtain ownership of arbitrary files via a symlink attack.
0
Attacker Value
Unknown
CVE-2018-10361
Disclosure Date: April 25, 2018 (last updated November 26, 2024)
An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure handling of temporary files in the KTextEditor's kauth_ktexteditor_helper service (as utilized in the Kate text editor) can allow other unprivileged users on the local system to gain root privileges. The attack occurs when one user (who has an unprivileged account but is also able to authenticate as root) writes a text file using Kate into a directory owned by a another unprivileged user. The latter unprivileged user conducts a symlink attack to achieve privilege escalation.
0
Attacker Value
Unknown
CVE-2018-6790
Disclosure Date: February 07, 2018 (last updated November 26, 2024)
An issue was discovered in KDE Plasma Workspace before 5.12.0. dataengines/notifications/notificationsengine.cpp allows remote attackers to discover client IP addresses via a URL in a notification, as demonstrated by the src attribute of an IMG element.
0
Attacker Value
Unknown
CVE-2018-6791
Disclosure Date: February 07, 2018 (last updated November 26, 2024)
An issue was discovered in soliduiserver/deviceserviceaction.cpp in KDE Plasma Workspace before 5.12.0. When a vfat thumbdrive that contains `` or $() in its volume label is plugged in and mounted through the device notifier, it's interpreted as a shell command, leading to a possibility of arbitrary command execution. An example of an offending volume label is "$(touch b)" -- this will create a file called b in the home folder.
0
Attacker Value
Unknown
CVE-2014-8878
Disclosure Date: September 28, 2017 (last updated November 26, 2024)
KDE KMail does not encrypt attachments in emails when "automatic encryption" is enabled, which allows remote attackers to obtain sensitive information by sniffing the network.
0