← Volver a CVEs
CVE-2002-1151
N/ADescripcion
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado10/11/2002
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
kde:kdekde:konqueror
Referencias
http://marc.info/?l=bugtraq&m=103175850925395&w=2(cve@mitre.org)
http://www.debian.org/security/2002/dsa-167(cve@mitre.org)
http://www.iss.net/security_center/static/10039.php(cve@mitre.org)
http://www.kde.org/info/security/advisory-20020908-2.txt(cve@mitre.org)
http://www.osvdb.org/7867(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2002-220.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2002-221.html(cve@mitre.org)
http://www.securityfocus.com/bid/5689(cve@mitre.org)
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt(af854a3a-2127-422b-91ae-364da2661108)
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000525(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=103175850925395&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2002/dsa-167(af854a3a-2127-422b-91ae-364da2661108)
http://www.iss.net/security_center/static/10039.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.kde.org/info/security/advisory-20020908-2.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/7867(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2002-220.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2002-221.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/5689(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.