kdelibs-common vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kdelibs-common package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-11.el7_7
  • L
Improper Input Validation

<6:4.14.8-10.el7
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • L
Improper Input Validation

<6:4.14.8-10.el7
  • L
Improper Input Validation

<6:4.14.8-10.el7
  • L
Improper Input Validation

<6:4.14.8-10.el7
  • L
Improper Input Validation

<6:4.14.8-10.el7
  • L
Improper Input Validation

<6:4.14.8-10.el7
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
Authentication Bypass

<6:4.14.8-6.el7_3
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-11.el7_7
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-8.el7_6
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-11.el7_7
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-11.el7_7
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-8.el7_6
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-11.el7_7
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-11.el7_7
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-8.el7_6
  • H
External Initialization of Trusted Variables or Data Stores

<6:4.14.8-8.el7_6
  • L
Information Exposure

*