TROYANOSYVIRUS
Volver a CVEs

CVE-2002-1393

N/A

Descripcion

Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado1/17/2003
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

kde:kde

Referencias

http://marc.info/?l=bugtraq&m=104049734911544&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=104066520330397&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/8067(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/8103(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-234(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-235(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-236(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-237(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-238(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-239(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-240(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-241(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-242(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-243(af854a3a-2127-422b-91ae-364da2661108)
http://www.kde.org/info/security/advisory-20021220-1.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2003-002.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2003-003.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/6462(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.