← Zuruck zu CVEs
CVE-2002-1151
N/ABeschreibung
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht10/11/2002
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
kde:kdekde:konqueror
Referenzen
http://marc.info/?l=bugtraq&m=103175850925395&w=2(cve@mitre.org)
http://www.debian.org/security/2002/dsa-167(cve@mitre.org)
http://www.iss.net/security_center/static/10039.php(cve@mitre.org)
http://www.kde.org/info/security/advisory-20020908-2.txt(cve@mitre.org)
http://www.osvdb.org/7867(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2002-220.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2002-221.html(cve@mitre.org)
http://www.securityfocus.com/bid/5689(cve@mitre.org)
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt(af854a3a-2127-422b-91ae-364da2661108)
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000525(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=103175850925395&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2002/dsa-167(af854a3a-2127-422b-91ae-364da2661108)
http://www.iss.net/security_center/static/10039.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.kde.org/info/security/advisory-20020908-2.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/7867(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2002-220.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2002-221.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/5689(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.