Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. KDE.org
  4. calligra

Known Vulnerabilities in calligra

Show more ↓
24.12.1
24.12.0
24.11.90
24.11.80
4.0.1
4.0.0
3.2.1
3.2.0
3.1.0
3.0.90
3.0.1
3.0.0.1
3.0.0
2.9.9
2.9.8
2.9.7
2.9.6
2.9.4
2.9.3
2.9.2
2.9.1
2.9.0
2.8.92
2.8.91
2.8.90
2.8.79.3
2.8.6
2.8.5
2.8.4
2.8.3
2.8.2
2.8.1
2.8.0
2.7.92
2.7.91
2.7.90
2.7.5
2.7.4
2.7.3
2.7.2
2.7.1
2.7.0
2.6.92
2.6.91
2.6.90
2.6.3
2.6.2
2.6.1
2.6.0
2.5.94
2.5.93
2.5.92
2.5.91
2.5.90
2.5.4
2.5.3
2.5.2
2.5.1
2.5.0
2.4.92
2.4.91
2.4.90
2.4.4
2.4.3
2.4.2
2.4.1
2.4.0
2.4
2.3.92
2.3.91
2.3.87
2.3.86
2.3.85
2.3.84
2.3.83
2.3.82
2.3.81
2.3.73
2.3.72
2.3.71
2.3.70
2.2.91
2.2.84
2.2.83
2.2.82
2.2.81
2.2.2
2.2.1
2.2.0
2.1.91
2.1.82
2.1.81
2.1.2
2.1.1
2.1.0
2.0.91
2.0.83
2.0.82
2.0.81
2.0.2
2.0.1
2.0.0
2.0
1.9.99.0
1.9.98.7
1.9.98.6
1.9.98.5
1.9.98.4
1.9.98.3
1.9.98.2
1.9.98.1
1.9.98.0
1.9.95.10
1.9.95.9
1.9.95.8
1.9.95.4
1.9.95.3
1.9.95.2
1.9.95.1
1.9.95
1.9.94
1.9.93
1.9.92
1.9.91
1.6.3
1.6.2
1.6.1
1.6.0
1.5.92
1.5.91
1.5.90
1.5.2
1.5.1
1.5.0
1.4.95
1.4.90
1.4.2
1.4.1
1.4.0
1.3.5
1.3.4
1.3.3
1.3.2
1.3.1
1.3
1.2.1
1.2
1.1.1
1.1



Heap-based buffer overflow in KDE calligra20 Aug, 2012
Medium Not Patched Public exploit


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Hackers exploit Discord invite system to spread info-stealers and RATs
  • One of longest-running drug marketplaces Archetyp Market shut down in global police op
  • Anubis ransomware adds destructive wiper module to its malware arsenal
  • Washington Post journalists targeted in suspected nation-state cyberattack
  • Cyber Security Week in Review: June 13, 2025
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.