TROYANOSYVIRUS
Retour aux CVEs

CVE-2002-1393

N/A

Description

Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.

Details CVE

Score CVSS v3.1N/A
Publie1/17/2003
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0

Produits affectes

kde:kde

References

http://marc.info/?l=bugtraq&m=104049734911544&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=104066520330397&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/8067(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/8103(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-234(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-235(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-236(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-237(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-238(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-239(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-240(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-241(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-242(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2003/dsa-243(af854a3a-2127-422b-91ae-364da2661108)
http://www.kde.org/info/security/advisory-20021220-1.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2003-002.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2003-003.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/6462(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.