Vulnerabilites related to kde - konqueror
Vulnerability from fkie_nvd
Published
2004-08-06 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
KDE Konqueror 2.1.1 and 2.2.2 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror 2.1.1 and 2.2.2 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified \"alt\" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a \"phishing\" attack." }, { "lang": "es", "value": "KDE Konqueror 2.1.1 y 2.2.2 permiten a atacantes remotos suplantar URL leg\u00edtimas en la barra de estado mediante etiquetas A HREF con valores \"alt\" modificados que apuntan al sitio leg\u00edtimo, combinado con un mapa de imagen cuyo HREF apunta al sitio malicioso, lo que facilita ataques de suplantaci\u00f3n para robo de datos (phising)\"." } ], "id": "CVE-2004-0527", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6579" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10383" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16102" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:kdelibs:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D9414A5-FE37-4B4E-8EA4-2D215B2F8CCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA65FE5A-5CB6-4C7D-91EC-C19EE762531E", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0E0A1D62-CE49-4810-91F0-839FE98CE2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "3E94D0BB-06BF-4E3A-AD7E-3FA68075EF62", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E5A4DD7A-6E50-4D3B-B667-2068350048AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4888F024-F126-48F1-A12F-1413EF981A79", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5B235AF-BA47-4F82-A3D8-16D70C987E06", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F8B632D-0A40-4BEE-8CD5-4DD713DACD17", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kdelibs:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C07A09FC-04EA-4EB8-9292-6D23CAE595EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED38ED0A-3213-4F0C-A76D-DC88B8E5CFBE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline (\"%0a\") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command." } ], "id": "CVE-2004-1165", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-10T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110245752232681\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-631" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-18.xml" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:045" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-065.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18384" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110245752232681\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-18.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-065.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-09-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.1.2 | |
kde | konqueror | 2.2.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.4 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61416A22-7309-4890-80B8-6E7C09C7BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F918814C-F129-4534-921A-38AF678A7016", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "60BE888B-FE26-4378-B853-29995A55920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka \"Cross Security Boundary Cookie Injection.\"" } ], "id": "CVE-2004-0870", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-09-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://securityfocus.com/archive/1/375407" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1011330" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://securityfocus.com/archive/1/375407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1011330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17417" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.1.2 | |
kde | konqueror | 2.2.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.4 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.2.6 | |
kde | konqueror | 3.2.3 | |
kde | konqueror | 3.3 | |
kde | konqueror | 3.3.1 | |
kde | konqueror | 3.3.2 | |
mandrakesoft | mandrake_linux | 10.0 | |
mandrakesoft | mandrake_linux | 10.0 | |
mandrakesoft | mandrake_linux | 10.1 | |
mandrakesoft | mandrake_linux | 10.1 | |
redhat | fedora_core | core_2.0 | |
redhat | fedora_core | core_3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61416A22-7309-4890-80B8-6E7C09C7BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F918814C-F129-4534-921A-38AF678A7016", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "60BE888B-FE26-4378-B853-29995A55920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "E24B7C8D-FD99-429B-86C2-D508A0D6FBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E9FBD50-02B9-459D-8600-57897E195A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED38ED0A-3213-4F0C-A76D-DC88B8E5CFBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C0102A8-7149-425C-9956-FB3640BFFA85", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "matchCriteriaId": "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "3528DABD-B821-4D23-AE12-614A9CA92C46", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "matchCriteriaId": "9E661D58-18DF-4CCF-9892-F873618F4535", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6996B14-925B-46B8-982F-3545328B506B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC80CF67-C51D-442C-9526-CFEDE84A6304", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the \"window injection\" vulnerability." } ], "id": "CVE-2004-1158", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-10T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110296048613575\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/13254" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/13477" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/13486" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/13560" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/multiple_browsers_window_injection_vulnerability_test/" }, { "source": "cve@mitre.org", "url": "http://secunia.com/secunia_research/2004-13/advisory/" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20041213-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11853" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110296048613575\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/13254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/13477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/13486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/13560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/multiple_browsers_window_injection_vulnerability_test/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2004-13/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20041213-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-21 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response." }, { "lang": "es", "value": "La implementaci\u00f3n del protocolo FTP en Konqueror versi\u00f3n 3.5.5, permite a los servidores remotos forzar al cliente a conectarse a otros servidores, al realizar un escaneo de puertos proxy u obtener informaci\u00f3n confidencial mediante la especificaci\u00f3n de una direcci\u00f3n de servidor alternativa en una respuesta PASV FTP." } ], "id": "CVE-2007-1564", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-03-21T19:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24889" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017801" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20070326-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:072" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23091" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1076" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1201" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20070326-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10646" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233592\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.\n\nMore information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/", "lastModified": "2007-03-23T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-08 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "8887E497-7174-4D9B-84BA-069D9F4D203E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property." }, { "lang": "es", "value": "KDE Konqueror 3.5.7 permite a atacantes remotos suplantar la barra de direcciones URL llamando al setInterval con un intervalo peque\u00f1o y cambiando la propiedad window.location." } ], "id": "CVE-2007-4224", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-08-08T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26351" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26612" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26690" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26720" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27089" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27090" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27096" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27106" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27108" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27271" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2982" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018579" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/475689/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/475730/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/475731/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/475763/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25219" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35828" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1615" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/475689/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/475730/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/475731/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/475763/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251708\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.", "lastModified": "2007-09-05T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-08 22:17
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in KDE Konqueror 3.5.7 and earlier allows remote attackers to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET, and A tags. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF211F58-836A-4964-822E-8D71C69194B4", "versionEndIncluding": "3.5.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in KDE Konqueror 3.5.7 and earlier allows remote attackers to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET, and A tags. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el KDE Konqueror 3.5.7 y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n y afirmaci\u00f3n fallida) a trav\u00e9s de un HTML mal-formado, como lo demostrado con un documento que contiene las etiquetas TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET y A. NOTA: la procedencia de esta informaci\u00f3n es desconocida; los detalles se obtienen a partir de la informaci\u00f3n de terceros." } ], "id": "CVE-2007-4229", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-08T22:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/42552" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/42552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25170" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat does not consider a crash of a client application such as Konqueror to be a security flaw.", "lastModified": "2007-08-09T00:00:00", "organization": "Red Hat" }, { "comment": "Mandriva does not consider crashes of client applications such as Konqueror to be a security issue.\n", "lastModified": "2007-09-18T00:00:00", "organization": "Mandriva" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-12-22 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kde:kde:3.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "F5F38CD2-8531-403D-B522-389DD4F8C5E7", "vulnerable": false }, { "criteria": "cpe:2.3:o:kde:kde:3.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "4060AC52-64EA-46E8-82EC-91F1040A4FCD", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A65B798-C4F1-44BF-8B64-FDB7F234580B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "HTMLTokenizer::scriptHandler en Konqueror de KDE v3.5.9 y v3.5.10, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una llamada no v\u00e1lida a document.load, esto lanza que se use un objeto eliminado. NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros." } ], "id": "CVE-2008-5698", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-12-22T15:30:00.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32208" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4796" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31696" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2915" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45804" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6718" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat does not consider a crash of a client application such as Konqueror to be a security issue.", "lastModified": "2009-01-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-21 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
Konqueror 3.5.5 allows remote attackers to cause a denial of service (crash) by using JavaScript to read a child iframe having an ftp:// URI.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror 3.5.5 allows remote attackers to cause a denial of service (crash) by using JavaScript to read a child iframe having an ftp:// URI." }, { "lang": "es", "value": "Konqueror 3.5.5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) usando JavaScript para leer un iframe hijo teniendo una ftp:// URI." } ], "id": "CVE-2007-1565", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-21T19:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "We do not consider a crash of a client application such as Konqueror to be a security issue.", "lastModified": "2007-03-26T00:00:00", "organization": "Red Hat" }, { "comment": "Mandriva does not consider crashes of client applications such as Konqueror to be a security issue.\n", "lastModified": "2007-09-18T00:00:00", "organization": "Mandriva" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-18 15:47
Modified
2025-04-03 01:03
Severity ?
Summary
KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | * | |
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.1.2 | |
kde | konqueror | 2.2.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.4 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.2 | |
kde | konqueror | 3.2.2.6 | |
kde | konqueror | 3.2.3 | |
kde | konqueror | 3.3 | |
kde | konqueror | 3.3.1 | |
kde | konqueror | 3.3.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "47E4D28B-032C-47CF-A917-B7B716FC8342", "versionEndIncluding": "3.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61416A22-7309-4890-80B8-6E7C09C7BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F918814C-F129-4534-921A-38AF678A7016", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "60BE888B-FE26-4378-B853-29995A55920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3AA19A3-CB04-4267-A8D3-49BEC5892CD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "E24B7C8D-FD99-429B-86C2-D508A0D6FBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E9FBD50-02B9-459D-8600-57897E195A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED38ED0A-3213-4F0C-A76D-DC88B8E5CFBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C0102A8-7149-425C-9956-FB3640BFFA85", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument." }, { "lang": "es", "value": "KDE Konqueror 3.5.1 y anteriores permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) a trav\u00e9s de la llamada al m\u00e9todo replaceChild sobre un objeto DOM, el cual dispara una referencia NULL, somo se demostr\u00f3 con la llamada a document.replaceChild con un argumento 0 (zero)." } ], "id": "CVE-2006-3672", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2006-07-18T15:47:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:130" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/27058" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18978" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-322-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2812" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/27058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-322-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27744" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "We do not consider a crash of a client application such as Konqueror to be a security issue.", "lastModified": "2006-08-30T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-07 00:19
Modified
2025-04-09 00:30
Severity ?
Summary
ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference." }, { "lang": "es", "value": "ecma/kjs_html.cpp en KDE JavaScript (KJS), como el usado en Konqueror en KDE 3.5.5, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) accediendo al contenido de un iframe con un URL ftp:// en el atributo src, probablemente debido a una referencia a un puntero nulo." } ], "id": "CVE-2007-1308", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-03-07T00:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://bindshell.net/advisories/konq355" }, { "source": "cve@mitre.org", "url": "http://bindshell.net/advisories/konq355/konq355-patch.diff" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052793.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2345" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:054" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/461897/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22814" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0886" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32798" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://bindshell.net/advisories/konq355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bindshell.net/advisories/konq355/konq355-patch.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052793.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/461897/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10551" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-12-24 18:29
Modified
2025-04-09 00:30
Severity ?
Summary
The HTML parser in KDE Konqueror 3.5.9 allows remote attackers to cause a denial of service (application crash) via (1) a long COLOR attribute in an HR element; or a long (a) BGCOLOR or (b) BORDERCOLOR attribute in a (2) TABLE, (3) TD, or (4) TR element. NOTE: the FONT vector is already covered by CVE-2008-4514.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "4A1F1157-C9DB-43EF-B215-04E7FBDD8E17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTML parser in KDE Konqueror 3.5.9 allows remote attackers to cause a denial of service (application crash) via (1) a long COLOR attribute in an HR element; or a long (a) BGCOLOR or (b) BORDERCOLOR attribute in a (2) TABLE, (3) TD, or (4) TR element. NOTE: the FONT vector is already covered by CVE-2008-4514." }, { "lang": "es", "value": "El analizador HTML en KDE Konqueror 3.5.9 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) mediante (1) un atributo COLOR largo en un elemento HR; o unos atributos (a) BGCOLOR o (b) BORDERCOLOR largos en un elemento (2) TABLE, (3) TD, o (4) TR. NOTA: el vector FONT est\u00e1 ya cubierto en CVE-2008-4514." } ], "id": "CVE-2008-5712", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-24T18:29:15.843", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4806" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47696" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6704" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat does not consider a crash of a client application such as Konqueror to be a security issue.", "lastModified": "2009-01-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror in KDE 3.0.3 allows remote attackers to cause a denial of service (core dump) via a web page that begins with a "xFFxFE" byte sequence and a large number of CRLF sequences, as demonstrated using freeze.htm.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.0.3 allows remote attackers to cause a denial of service (core dump) via a web page that begins with a \"xFFxFE\" byte sequence and a large number of CRLF sequences, as demonstrated using freeze.htm." } ], "id": "CVE-2003-1478", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/320266" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/7486" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/320266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/7486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11971" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F531972-E0A7-4E7C-A899-3766CEAAE2EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CEED379-3111-4451-B782-8C66CE568A1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B146FCD3-F6E7-4412-94FD-F9E66089C227", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "99CB51E4-0BFC-4C7C-B9EE-3DBCB0188D73", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C629F0C8-C765-4076-B426-80929F9CE285", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains." }, { "lang": "es", "value": "La protecci\u00f3n de ejecuci\u00f3n de secuencias de comandos (scripts) en sitios cruzados en Konqueror 2.2.2 y 3.0 a 3.0.3 no inicializa adecuandamente los dominios en sub-marcos y sub-iframes (marcos incrustados), lo que puede permitir que atacantes remotos ejecuten comandos y roben cookies de submarcos que est\u00e1n en otros dominios." } ], "id": "CVE-2002-1151", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000525" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103175850925395\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-167" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10039.php" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20020908-2.txt" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/7867" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103175850925395\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10039.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20020908-2.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/7867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5689" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-04-15 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror_embedded:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "68C3DE36-4687-4157-8C7F-223B289B9A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via \"%2e%2e\" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application." }, { "lang": "es", "value": "Konqueror en KDE 3.1.3 y anteriores (kdelibs) permite a atacantes remotos saltarse las restriciones de cookies pretendidas en una aplicaci\u00f3n web mediante secuencias de atravesamiento de directorios \"%2e%2e\" (punto punto codificado) en una URL, lo que hace que Konqueror env\u00ede la cookie fuera de los subconjuntos de URL especificados, por ejemplo a una aplicaci\u00f3n vulnerable que corre en el mismo servidor que la aplicaci\u00f3n objetivo." } ], "id": "CVE-2003-0592", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-04-15T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2004/dsa-459" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:022" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-074.html" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2004/dsa-459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-074.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A823" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-09-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.1.2 | |
kde | konqueror | 2.2.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.4 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.3 | |
microsoft | ie | 6.0 | |
microsoft | ie | 6.0 | |
microsoft | internet_explorer | 6.0 | |
mozilla | firefox | 0.9.2 | |
suse | suse_linux | 1.0 | |
suse | suse_linux | 8 | |
suse | suse_linux | 8.1 | |
suse | suse_linux | 8.2 | |
suse | suse_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61416A22-7309-4890-80B8-6E7C09C7BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F918814C-F129-4534-921A-38AF678A7016", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "60BE888B-FE26-4378-B853-29995A55920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "24DF2AB3-DEAB-4D70-986E-FFBB7E64B96A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DA3D2175-7DF7-4D57-8B26-5BA68EF7A935", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A19F6133-25D1-44A5-B6B9-354703436783", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", "matchCriteriaId": "C7EAAD04-D7C4-43DE-B488-1AAD014B503E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ], "id": "CVE-2004-0866", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-09-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://securitytracker.com/id?1011332" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11186" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://securitytracker.com/id?1011332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session. NOTE: it was later reported that 2.x is also affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.1.2 | |
kde | konqueror | 2.2.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.4 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.3 | |
microsoft | ie | 6.0 | |
microsoft | ie | 6.0 | |
microsoft | internet_explorer | 6.0 | |
mozilla | firefox | 0.9.2 | |
suse | suse_linux | 1.0 | |
suse | suse_linux | 8 | |
suse | suse_linux | 8.1 | |
suse | suse_linux | 8.2 | |
suse | suse_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61416A22-7309-4890-80B8-6E7C09C7BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F918814C-F129-4534-921A-38AF678A7016", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "60BE888B-FE26-4378-B853-29995A55920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "24DF2AB3-DEAB-4D70-986E-FFBB7E64B96A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DA3D2175-7DF7-4D57-8B26-5BA68EF7A935", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A19F6133-25D1-44A5-B6B9-354703436783", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", "matchCriteriaId": "C7EAAD04-D7C4-43DE-B488-1AAD014B503E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session. NOTE: it was later reported that 2.x is also affected." }, { "lang": "es", "value": "Mozilla Firefox 0.9.2 pemite a sitios web establecer cookies para dominios de nivel superior espec\u00edficos de pa\u00edses, como .ltd.uk, .plc.uk, y .sch.uk, lo que podr\u00eda permitir a atacantes remotos realizar ataques de fijaci\u00f3n de sesi\u00f3n y secuestrar sesiones HTTP de un usuario. NOTA: se ha informado posteriormente que la versi\u00f3n 2.X tambi\u00e9n se encuentra afectada por esta vulnerabilidad." } ], "id": "CVE-2004-0867", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12580/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1011331" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11186" }, { "source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=252342" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12580/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1011331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=252342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-04-22 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
Konqueror 3.5.5 release 45.4 allows remote attackers to cause a denial of service (browser crash or abort) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror 3.5.5 release 45.4 allows remote attackers to cause a denial of service (browser crash or abort) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/." }, { "lang": "es", "value": "Konqueror 3.5.5 en el lanzamiento 45.4 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida o aborto de aplicaci\u00f3n) a trav\u00e9s de JavaScript que valida una expresi\u00f3n regular contra una cadena larga, como se demostr\u00f3 utilizando /(.)*/." } ], "id": "CVE-2007-2164", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-04-22T19:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2600" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/466017/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/466147/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/466017/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/466147/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Mandriva does not consider crashes of client applications such as Konqueror to be a security issue.\n", "lastModified": "2007-09-18T00:00:00", "organization": "Mandriva" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-07-27 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3AA19A3-CB04-4267-A8D3-49BEC5892CD8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability." }, { "lang": "es", "value": "Konqueror 3.1.3, 3.2.2, y posiblemente otras versiones no previenen adecuadamente que un marco de un dominio inyecte contenido en un marco que pertenece a otro dominio, lo que facilita la suplantaci\u00f3n de sitios web y otros ataques. Vulnerabilidad tambi\u00e9n conocida como \"de inyecci\u00f3n de marco\"." } ], "id": "CVE-2004-0721", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-07-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109225538901170\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/11978" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/multiple_browsers_frame_injection_vulnerability_test/" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200408-13.xml" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20040811-3.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1598" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109225538901170\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/11978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/multiple_browsers_frame_injection_vulnerability_test/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200408-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20040811-3.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11371" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-07-07 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC40F7C2-BF1F-4A4B-BF42-57039B3B1D4A", "versionEndIncluding": "3.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter \"-\" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code." }, { "lang": "es", "value": "Los manejadores de URI en Konqueror de KDE 3.2.2 y anteriores no filtran adecuadamente caract\u00e9res \"-\" en el inicio de un nombre de m\u00e1quina en URIs (1) telnet, (2) rlogin, (3) ssh, o (4) mailto, lo que permite a atacantes remotos manipular las opciones que son pasadas a los programas asociados, posiblemente permitiendo leer ficheros o ejecutar c\u00f3digo de su elecci\u00f3n." } ], "id": "CVE-2004-0411", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-07-07T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000843" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108481412427344\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/11602" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200405-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/o-146.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-518" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kde.org/info/security/advisory-20040517-1.txt" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/6107" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-222.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/advisories/6717" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/advisories/6743" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/363225" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/10358" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.362635" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16163" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108481412427344\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/11602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200405-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/o-146.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kde.org/info/security/advisory-20040517-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/6107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-222.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/advisories/6717" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/advisories/6743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/363225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/10358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.362635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-08-27 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the "user:password@host" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror_embedded | 0.1 | |
redhat | analog_real-time_synthesizer | 2.1.1-5 | |
redhat | analog_real-time_synthesizer | 2.2-11 | |
redhat | analog_real-time_synthesizer | 2.2-11 | |
redhat | kdebase | 3.0.3-13 | |
redhat | kdebase | 3.0.3-13 | |
redhat | kdelibs | 2.1.1-5 | |
redhat | kdelibs | 2.2-11 | |
redhat | kdelibs | 2.2-11 | |
redhat | kdelibs | 3.0.0-10 | |
redhat | kdelibs | 3.1-10 | |
redhat | kdelibs_devel | 2.1.1-5 | |
redhat | kdelibs_devel | 2.2-11 | |
redhat | kdelibs_devel | 2.2-11 | |
redhat | kdelibs_devel | 3.0.0-10 | |
redhat | kdelibs_devel | 3.0.3-8 | |
redhat | kdelibs_devel | 3.1-10 | |
redhat | kdelibs_sound | 2.1.1-5 | |
redhat | kdelibs_sound | 2.2-11 | |
redhat | kdelibs_sound | 2.2-11 | |
redhat | kdelibs_sound_devel | 2.1.1-5 | |
redhat | kdelibs_sound_devel | 2.2-11 | |
redhat | kdelibs_sound_devel | 2.2-11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror_embedded:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "68C3DE36-4687-4157-8C7F-223B289B9A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:analog_real-time_synthesizer:2.1.1-5:*:i386:*:*:*:*:*", "matchCriteriaId": "E69316C9-2654-43BB-BDC8-7E51817F2C39", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:analog_real-time_synthesizer:2.2-11:*:i386:*:*:*:*:*", "matchCriteriaId": "41106F63-D866-4828-AF9B-E6CB74598BA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:analog_real-time_synthesizer:2.2-11:*:ia64:*:*:*:*:*", "matchCriteriaId": "F88FFE1F-B237-4576-A12F-C5EFDA06B3E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdebase:3.0.3-13:*:i386:*:*:*:*:*", "matchCriteriaId": "AA307F24-5698-4218-9119-AD9992E9224E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdebase:3.0.3-13:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "7A71CCC3-E8EE-4FB7-975C-EC7789253B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs:2.1.1-5:*:i386:*:*:*:*:*", "matchCriteriaId": "6E963D5A-AC10-45CA-922C-2D42385C7B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs:2.2-11:*:i386:*:*:*:*:*", "matchCriteriaId": "77CBE86A-D66F-47C9-9A2C-5DF8ACFF2B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs:2.2-11:*:ia64:*:*:*:*:*", "matchCriteriaId": "E064246D-9A5D-40AA-BA69-4B3100D2A899", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs:3.0.0-10:*:i386:*:*:*:*:*", "matchCriteriaId": "F6473F1B-EBCB-4631-B284-C6408AD09309", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs:3.1-10:*:i386:*:*:*:*:*", "matchCriteriaId": "BC791558-6B56-4774-8231-3CFEA3D827AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_devel:2.1.1-5:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "186AB694-789E-45B4-B999-DB120341522E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_devel:2.2-11:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "20F7B0DF-95B1-4DB2-A4C2-8F7B15CF733F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_devel:2.2-11:*:ia64_dev:*:*:*:*:*", "matchCriteriaId": "CB838D21-B661-4E8F-B9CE-8800A12EC2BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_devel:3.0.0-10:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "02819BAF-EA41-4E1A-8605-DB12B71C6DF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_devel:3.0.3-8:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "3D1BDA11-0C20-42C2-9155-EC810B601962", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_devel:3.1-10:*:i386_dev:*:*:*:*:*", "matchCriteriaId": "63129CB5-8F86-42A1-811C-B912E4FA0864", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_sound:2.1.1-5:*:i386_sound:*:*:*:*:*", "matchCriteriaId": "17B843FA-0A1B-4FDF-8D61-DE622307AF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_sound:2.2-11:*:i386_sound:*:*:*:*:*", "matchCriteriaId": "F590964D-DBC6-4455-9AC8-9DAF548E620A", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_sound:2.2-11:*:ia64_sound:*:*:*:*:*", "matchCriteriaId": "DF8C9A0C-0031-41FF-9DCF-0E270841B53B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_sound_devel:2.1.1-5:*:i386_sound_dev:*:*:*:*:*", "matchCriteriaId": "471D4901-9512-43A3-AC2E-03A54197B981", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_sound_devel:2.2-11:*:i386_sound_dev:*:*:*:*:*", "matchCriteriaId": "7FB3EE08-A635-497B-A859-DDB1B2D86FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:kdelibs_sound_devel:2.2-11:*:ia64_sound_dev:*:*:*:*:*", "matchCriteriaId": "99CC879D-A96B-4508-B146-4C57D2BB1CD6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the \"user:password@host\" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites." }, { "lang": "es", "value": "KDE Konqueror de KDE 3.1.2 y anteriores no elimina los credenciales de autenticaci\u00f3n de URLs de la forma \"usuario:contrase\u00f1a@m\u00e1quina\" en la cabecera HTTP-Referer, lo que podr\u00eda permitir a sitios web remotos robar las credenciales de p\u00e1ginas que enlazan a esos sitios." } ], "id": "CVE-2003-0459", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-08-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007300.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=105986238428061\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-361" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20030729-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:079" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-235.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-236.html" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.com/security/TLSA-2003-45.txt" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007300.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=105986238428061\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20030729-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-235.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-236.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.com/security/TLSA-2003-45.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A411" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-01-29 16:28
Modified
2025-04-09 00:30
Severity ?
Summary
The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." }, { "lang": "es", "value": "La biblioteca HTML KDE (kdelibs), como es usado en Konqueror versi\u00f3n 3.5.5, no analiza de manera apropiada los comentarios HTML, lo que permite a los atacantes remotos conducir ataques de tipo Cross-Site Scripting (XSS) y omitir algunos esquemas de protecci\u00f3n XSS mediante la incorporaci\u00f3n de ciertas etiquetas HTML en un comentario en una etiqueta title, un problema relacionado con CVE-2007-0478." } ], "id": "CVE-2007-0537", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-01-29T16:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/32975" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23932" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24013" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24065" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24442" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24463" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24889" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017591" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22428" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1117" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/32975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=225414\n\nThe Red Hat Security Response Team has rated this issue as having low security\nimpact, a future update may address this flaw. More information regarding\nissue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/", "lastModified": "2007-02-15T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-08 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "8887E497-7174-4D9B-84BA-069D9F4D203E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion." }, { "lang": "es", "value": "Vulnerabilidad de truncado visual en KDE Konqueror 3.5.7 permite a atacantes remotos falsificar la barra de direcciones URL mediante un URI http con una gran cantidad de espacios en blanco en la parte user/password." } ], "id": "CVE-2007-4225", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-08-08T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26351" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26612" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26690" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26720" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27089" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27096" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2982" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018579" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35829" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1615" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. Not vulnerable. These issues did not affect the versions of konqueror as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", "lastModified": "2007-08-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-11 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
Visual truncation vulnerability in Konqueror 3.5.5 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual truncation vulnerability in Konqueror 3.5.5 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication." }, { "lang": "es", "value": "Vulnerabilidad de truncamiento visual en Konqueror 3.5.5 permite a atacantes remotos envenenar la barra de direcci\u00f3n y posiblemente realizar ataques de phishing a trav\u00e9s de un nombre de host largo, el cual est\u00e1 truncado despu\u00e9s de un cierto n\u00famero de caracteres, como se demostr\u00f3 por un ataque de phishing utilizando HTTP Basic Authentication." } ], "id": "CVE-2007-3143", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-11T18:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/43465" }, { "source": "cve@mitre.org", "url": "http://testing.bitsploit.de/test.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.0x000000.com/?i=334" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/24352" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/43465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://testing.bitsploit.de/test.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.0x000000.com/?i=334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/24352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=252169\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.", "lastModified": "2007-08-17T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-10-02 18:18
Modified
2025-04-09 00:30
Severity ?
Summary
Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "4A1F1157-C9DB-43EF-B215-04E7FBDD8E17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters." }, { "lang": "es", "value": "Konqueror de KDE v3.5.9 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un Javascript que llama a la funci\u00f3n alert con una cadena codificada en formato URL de un n\u00famero largo de caracteres inv\u00e1lidos." } ], "id": "CVE-2008-4382", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-10-02T18:18:05.867", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496849/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496849/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45645" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "We do not consider a crash of a client application such as Konqueror to be a security issue.", "lastModified": "2017-08-07T21:32:36.217", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-02 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in webkitpart.cpp in kwebkitpart allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a "universal XSS" issue, a similar vulnerability to CVE-2010-2536.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
urs_wolfer | kwebkitpart | * | |
urs_wolfer | kwebkitpart | 0.9.6 | |
kde | konqueror | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:urs_wolfer:kwebkitpart:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDA204CB-896B-4963-8FB6-75891B313CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:urs_wolfer:kwebkitpart:0.9.6:beta:*:*:*:*:*:*", "matchCriteriaId": "933FF330-0F29-4AD0-8E24-88D4069EF9AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A65B798-C4F1-44BF-8B64-FDB7F234580B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in webkitpart.cpp in kwebkitpart allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a \"universal XSS\" issue, a similar vulnerability to CVE-2010-2536." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en webkitpart.cpp en kwebkitpart permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante una URL asociada con un nombre de dominio no existente, relacionado con un problema \"universal XSS\", una vulnerabilidad similar a CVE-2010-2536." } ], "id": "CVE-2009-4976", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-02T21:00:45.920", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://websvn.kde.org/?view=rev\u0026revision=1059140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugs.kde.org/show_bug.cgi?id=217464" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://websvn.kde.org/?view=rev\u0026revision=1059140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugs.kde.org/show_bug.cgi?id=217464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-09-24 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F531972-E0A7-4E7C-A899-3766CEAAE2EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CEED379-3111-4451-B782-8C66CE568A1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B146FCD3-F6E7-4412-94FD-F9E66089C227", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "99CB51E4-0BFC-4C7C-B9EE-3DBCB0188D73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack." }, { "lang": "es", "value": "La capacidad SSL en Konqueror 3.0.2 y anteriores no verifica las restricc\u00edones b\u00e1sicas de una certificad intermedio firmado por una AC (Autoridad Certificadora), lo que permite a atacantes remotos falsear los certificados de sitios de confianza mediante un ataque de hombre en el medio (man-in-the-middle." } ], "id": "CVE-2002-0970", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-09-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-08/0170.html" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000519" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=102918241005893\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-155" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20020818-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:058" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5410" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-08/0170.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=102918241005893\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20020818-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 0.1 | |
kde | konqueror | 2.1.1 | |
kde | konqueror | 2.1.2 | |
kde | konqueror | 2.2.1 | |
kde | konqueror | 2.2.2 | |
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.4 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.2.6 | |
kde | konqueror | 3.2.3 | |
kde | konqueror | 3.3 | |
kde | konqueror | 3.3.1 | |
kde | konqueror | 3.3.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:0.1:*:embedded:*:*:*:*:*", "matchCriteriaId": "32FEF1A8-032B-4AFF-883C-1C253F9B240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "417F34FB-A6B0-4090-BDC9-6D4C1BF0D3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61416A22-7309-4890-80B8-6E7C09C7BE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F918814C-F129-4534-921A-38AF678A7016", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D435E39F-4F70-481B-9225-B072B79BEB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "60BE888B-FE26-4378-B853-29995A55920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "E24B7C8D-FD99-429B-86C2-D508A0D6FBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E9FBD50-02B9-459D-8600-57897E195A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED38ED0A-3213-4F0C-A76D-DC88B8E5CFBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C0102A8-7149-425C-9956-FB3640BFFA85", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site." } ], "id": "CVE-2005-4684", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15331" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B8920C38-1362-48FA-91AB-77E17F43CF82", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.95.00:*:*:*:*:*:*:*", "matchCriteriaId": "2DEBAFE0-0172-4622-B9F0-64B175183ACA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site." }, { "lang": "es", "value": "KDE Konqueror 3.5.5 y 3.95.00, cuando un usuario acepta un certificado de servidor SSL bas\u00e1ndose en el nombre de dominio CN del campo DN, considera el certificado como aceptado tambi\u00e9n para todos los nombres de dominios en los campos subjectAltName:dNSName, incluso aunque estos campos no pueden ser examinados en el producto, lo cual facilita a los atacantes remotos enga\u00f1ar al usuario para que acepte un certificado inv\u00e1lido para un sitio web falso." } ], "id": "CVE-2007-6591", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-28T21:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://nils.toedtmann.net/pub/subjectAltName.txt" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3498" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/483929/100/100/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/483937/100/100/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/483960/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://nils.toedtmann.net/pub/subjectAltName.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/483929/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/483937/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/483960/100/100/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-6591\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/#low", "lastModified": "2008-01-10T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-20 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A65B798-C4F1-44BF-8B64-FDB7F234580B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692." }, { "lang": "es", "value": "KDE Konqueror permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de de un valor entero largo en la propiedad lenght en un objeto Select, relativo a CVE-2009-1692.\r\n" } ], "id": "CVE-2009-2537", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-07-20T18:30:01.157", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36057" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36062" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/9160" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52871" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/9160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat does not consider a user-assisted crash of a client application such as Konqueror to be a security issue.", "lastModified": "2009-08-07T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-17 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "8887E497-7174-4D9B-84BA-069D9F4D203E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed." }, { "lang": "es", "value": "konqueror/konq_combo.cc en Konqueror 3.5.7 permite a atacantes remotos suplantar datos: el esquema URI en la barra de direcciones a trav\u00e9s de una URI larga con espacios en blanco que se arrastra, lo cual previene que se muestre el comienzo de la URI." } ], "id": "CVE-2007-3820", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-17T01:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://alt.swiecki.net/oper1.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/37242" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26091" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26612" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26720" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27089" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27090" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27096" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27106" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27108" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2905" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/473703/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/473712/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24912" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24918" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018396" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2538" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35430" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://alt.swiecki.net/oper1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/473703/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/473712/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect Red Hat Enterprise Linux 2.1 or 3. For Red Hat Enterprise Linux 4 and 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248537\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.", "lastModified": "2007-09-05T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | konqueror | 3.0 | |
kde | konqueror | 3.0.1 | |
kde | konqueror | 3.0.2 | |
kde | konqueror | 3.0.3 | |
kde | konqueror | 3.0.5 | |
kde | konqueror | 3.0.5b | |
kde | konqueror | 3.1 | |
kde | konqueror | 3.1.1 | |
kde | konqueror | 3.1.2 | |
kde | konqueror | 3.1.3 | |
kde | konqueror | 3.1.5 | |
kde | konqueror | 3.2.1 | |
kde | konqueror | 3.2.3 | |
gentoo | linux | 1.4 | |
kde | kde | 3.1.3 | |
kde | kde | 3.2 | |
mandrakesoft | mandrake_linux | 9.2 | |
mandrakesoft | mandrake_linux | 9.2 | |
mandrakesoft | mandrake_linux | 10.0 | |
mandrakesoft | mandrake_linux | 10.0 | |
suse | suse_linux | 8 | |
suse | suse_linux | 8.1 | |
suse | suse_linux | 8.2 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8AD68BAB-8945-4A22-938E-12C01D0111D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B3220BF-B0AF-4C90-89BD-B425EE58021D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA53FB7A-AF7F-45B2-AF23-11B1FC4EC289", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "619EB7F6-8694-4344-A4C9-A35DA58391AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7FED2DFC-592C-4FD3-B0B7-C670C78F56DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*", "matchCriteriaId": "9EC65385-B190-44BE-9AF8-B14F48303046", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F7BAE27-7AB1-4DBD-98AD-6109F0D9A458", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF8A54F6-96A9-44B8-97C8-50DA7276708D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1001754B-8EDB-41A2-9D5D-6E2A2B556DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8D57D87-3E6A-4A73-85BA-EE679E9DA8D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E4FC9B-F47C-4BD5-B2C7-23CBAD2D5488", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3C0DB31D-D075-409C-9ED9-A9E1D96332CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A3096F2-B0F1-45E1-806D-6434DE56619A", "vulnerable": true }, { "criteria": "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "82F69843-978D-4686-BC5B-1D09DA4A21BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "4177C378-7729-46AB-B49B-C6DAED3200E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "matchCriteriaId": "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", "vulnerable": true }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "matchCriteriaId": "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." }, { "lang": "es", "value": "Konqueror en KDE 3.2.3 Y anteriores pemiten a sitios web establecer cookies para dominios de nivel superior espec\u00edficos de pa\u00edses, como ltd.uk o com.es, lo que podr\u00eda permitir a atacantes remotos realizar un ataque de fijaci\u00f3n de sesi\u00f3n y secuestrar una sesi\u00f3n HTTP de un usuario." } ], "id": "CVE-2004-0746", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109327681304401\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12341" }, { "source": "cve@mitre.org", "url": "http://www.kde.org/info/security/advisory-20040823-1.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:086" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10991" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17063" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109327681304401\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kde.org/info/security/advisory-20040823-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11281" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-15 22:46
Modified
2025-04-09 00:30
Severity ?
Summary
KDE Konqueror 3.5.6 and earlier allows remote attackers to cause a denial of service (crash) via large HTTP cookie parameters.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D08BED1-F89C-4859-BAA5-7BD241213C38", "versionEndIncluding": "3.5.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.6 and earlier allows remote attackers to cause a denial of service (crash) via large HTTP cookie parameters." }, { "lang": "es", "value": "KDE Konqueror 3.5.6 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante par\u00e1metros de cookie HTTP grandes." } ], "id": "CVE-2007-6000", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-15T22:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3370" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/483705/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26435" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/483705/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38456" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0172B167-5780-4F80-ACC9-2FB8B60D6717", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACEE0AED-7918-41E9-A902-AC4070E03132", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "id": "CVE-2005-0237", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031460.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14162" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kde.org/info/security/advisory-20050316-2.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:058" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2005-325.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/427976/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/12461" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.shmoo.com/idn" }, { "source": "secalert@redhat.com", "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031460.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kde.org/info/security/advisory-20050316-2.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-325.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/427976/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.shmoo.com/idn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.shmoo.com/idn/homograph.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10671" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2009-2537 (GCVE-0-2009-2537)
Vulnerability from cvelistv5
Published
2009-07-20 18:00
Modified
2024-08-07 05:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:15.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html" }, { "name": "FEDORA-2009-8039", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html" }, { "name": "MDVSA-2009:330", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330" }, { "name": "FEDORA-2009-8046", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html" }, { "name": "20090715 Re:[GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded" }, { "name": "36062", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36062" }, { "name": "36057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36057" }, { "name": "20090716 Re[2]: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded" }, { "name": "9160", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/9160" }, { "name": "FEDORA-2009-8049", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html" }, { "name": "20090715 [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded" }, { "name": "konqueror-integer-value-dos(52871)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52871" }, { "name": "20090715 Re: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded" }, { "name": "FEDORA-2009-8020", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html" }, { "name": "FEDORA-2009-8039", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html" }, { "name": "MDVSA-2009:330", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330" }, { "name": "FEDORA-2009-8046", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html" }, { "name": "20090715 Re:[GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded" }, { "name": "36062", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36062" }, { "name": "36057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36057" }, { "name": "20090716 Re[2]: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded" }, { "name": "9160", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/9160" }, { "name": "FEDORA-2009-8049", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html" }, { "name": "20090715 [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded" }, { "name": "konqueror-integer-value-dos(52871)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52871" }, { "name": "20090715 Re: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded" }, { "name": "FEDORA-2009-8020", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.g-sec.lu/one-bug-to-rule-them-all.html", "refsource": "MISC", "url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html" }, { "name": "FEDORA-2009-8039", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html" }, { "name": "MDVSA-2009:330", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:330" }, { "name": "FEDORA-2009-8046", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html" }, { "name": "20090715 Re:[GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded" }, { "name": "36062", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36062" }, { "name": "36057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36057" }, { "name": "20090716 Re[2]: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded" }, { "name": "9160", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/9160" }, { "name": "FEDORA-2009-8049", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html" }, { "name": "20090715 [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded" }, { "name": "konqueror-integer-value-dos(52871)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52871" }, { "name": "20090715 Re: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded" }, { "name": "FEDORA-2009-8020", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2537", "datePublished": "2009-07-20T18:00:00", "dateReserved": "2009-07-20T00:00:00", "dateUpdated": "2024-08-07T05:52:15.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5712 (GCVE-0-2008-5712)
Vulnerability from cvelistv5
Published
2008-12-24 17:00
Modified
2024-08-07 11:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The HTML parser in KDE Konqueror 3.5.9 allows remote attackers to cause a denial of service (application crash) via (1) a long COLOR attribute in an HR element; or a long (a) BGCOLOR or (b) BORDERCOLOR attribute in a (2) TABLE, (3) TD, or (4) TR element. NOTE: the FONT vector is already covered by CVE-2008-4514.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:04:44.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "konqueror-htmlparser-dos(47696)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47696" }, { "name": "6704", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6704" }, { "name": "4806", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4806" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The HTML parser in KDE Konqueror 3.5.9 allows remote attackers to cause a denial of service (application crash) via (1) a long COLOR attribute in an HR element; or a long (a) BGCOLOR or (b) BORDERCOLOR attribute in a (2) TABLE, (3) TD, or (4) TR element. NOTE: the FONT vector is already covered by CVE-2008-4514." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "konqueror-htmlparser-dos(47696)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47696" }, { "name": "6704", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6704" }, { "name": "4806", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4806" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTML parser in KDE Konqueror 3.5.9 allows remote attackers to cause a denial of service (application crash) via (1) a long COLOR attribute in an HR element; or a long (a) BGCOLOR or (b) BORDERCOLOR attribute in a (2) TABLE, (3) TD, or (4) TR element. NOTE: the FONT vector is already covered by CVE-2008-4514." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "konqueror-htmlparser-dos(47696)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47696" }, { "name": "6704", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6704" }, { "name": "4806", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4806" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5712", "datePublished": "2008-12-24T17:00:00", "dateReserved": "2008-12-24T00:00:00", "dateUpdated": "2024-08-07T11:04:44.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4225 (GCVE-0-2007-4225)
Vulnerability from cvelistv5
Published
2007-08-08 21:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2982", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2982" }, { "name": "FEDORA-2007-2361", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "FEDORA-2007-716", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html" }, { "name": "USN-502-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "konqueror-data-spoofing(35829)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35829" }, { "name": "ADV-2007-2807", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "name": "26351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26351" }, { "name": "26690", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26690" }, { "name": "1018579", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018579" }, { "name": "27089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27096" }, { "name": "26720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26720" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1615" }, { "name": "MDKSA-2007:176", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2982", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2982" }, { "name": "FEDORA-2007-2361", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "FEDORA-2007-716", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html" }, { "name": "USN-502-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "konqueror-data-spoofing(35829)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35829" }, { "name": "ADV-2007-2807", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "name": "26351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26351" }, { "name": "26690", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26690" }, { "name": "1018579", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018579" }, { "name": "27089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27096" }, { "name": "26720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26720" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1615" }, { "name": "MDKSA-2007:176", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2982", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2982" }, { "name": "FEDORA-2007-2361", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "FEDORA-2007-716", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html" }, { "name": "USN-502-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "konqueror-data-spoofing(35829)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35829" }, { "name": "ADV-2007-2807", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "name": "26351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26351" }, { "name": "26690", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26690" }, { "name": "1018579", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018579" }, { "name": "27089", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27096" }, { "name": "26720", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26720" }, { "name": "https://issues.rpath.com/browse/RPL-1615", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1615" }, { "name": "MDKSA-2007:176", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "name": "http://www.kde.org/info/security/advisory-20070816-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4225", "datePublished": "2007-08-08T21:00:00", "dateReserved": "2007-08-08T00:00:00", "dateUpdated": "2024-08-07T14:46:39.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3143 (GCVE-0-2007-3143)
Vulnerability from cvelistv5
Published
2007-06-11 18:00
Modified
2024-08-07 14:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Visual truncation vulnerability in Konqueror 3.5.5 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:28.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24352", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24352" }, { "name": "43465", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/43465" }, { "name": "multiple-basic-authentication-spoofing(34983)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://testing.bitsploit.de/test.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.0x000000.com/?i=334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Visual truncation vulnerability in Konqueror 3.5.5 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "24352", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24352" }, { "name": "43465", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/43465" }, { "name": "multiple-basic-authentication-spoofing(34983)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983" }, { "tags": [ "x_refsource_MISC" ], "url": "http://testing.bitsploit.de/test.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.0x000000.com/?i=334" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Visual truncation vulnerability in Konqueror 3.5.5 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24352", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24352" }, { "name": "43465", "refsource": "OSVDB", "url": "http://osvdb.org/43465" }, { "name": "multiple-basic-authentication-spoofing(34983)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34983" }, { "name": "http://testing.bitsploit.de/test.html", "refsource": "MISC", "url": "http://testing.bitsploit.de/test.html" }, { "name": "http://www.0x000000.com/?i=334", "refsource": "MISC", "url": "http://www.0x000000.com/?i=334" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3143", "datePublished": "2007-06-11T18:00:00", "dateReserved": "2007-06-11T00:00:00", "dateUpdated": "2024-08-07T14:05:28.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0527 (GCVE-0-2004-0527)
Vulnerability from cvelistv5
Published
2004-06-08 04:00
Modified
2024-08-08 00:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror 2.1.1 and 2.2.2 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6579", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6579" }, { "name": "ie-ahref-url-spoofing(16102)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16102" }, { "name": "10383", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10383" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror 2.1.1 and 2.2.2 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified \"alt\" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a \"phishing\" attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6579", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6579" }, { "name": "ie-ahref-url-spoofing(16102)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16102" }, { "name": "10383", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10383" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror 2.1.1 and 2.2.2 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified \"alt\" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a \"phishing\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6579", "refsource": "OSVDB", "url": "http://www.osvdb.org/6579" }, { "name": "ie-ahref-url-spoofing(16102)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16102" }, { "name": "10383", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10383" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0527", "datePublished": "2004-06-08T04:00:00", "dateReserved": "2004-06-03T00:00:00", "dateUpdated": "2024-08-08T00:24:26.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5698 (GCVE-0-2008-5698)
Vulnerability from cvelistv5
Published
2008-12-22 15:00
Modified
2024-08-07 11:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:04:44.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31696", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31696" }, { "name": "32208", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32208" }, { "name": "ADV-2008-2915", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2915" }, { "name": "konqueror-load-dos(45804)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45804" }, { "name": "4796", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4796" }, { "name": "6718", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-10T00:00:00", "descriptions": [ { "lang": "en", "value": "HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31696", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31696" }, { "name": "32208", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32208" }, { "name": "ADV-2008-2915", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2915" }, { "name": "konqueror-load-dos(45804)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45804" }, { "name": "4796", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4796" }, { "name": "6718", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5698", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTMLTokenizer::scriptHandler in Konqueror in KDE 3.5.9 and 3.5.10 allows remote attackers to cause a denial of service (application crash) via an invalid document.load call that triggers use of a deleted object. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31696" }, { "name": "32208", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32208" }, { "name": "ADV-2008-2915", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2915" }, { "name": "konqueror-load-dos(45804)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45804" }, { "name": "4796", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4796" }, { "name": "6718", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6718" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5698", "datePublished": "2008-12-22T15:00:00", "dateReserved": "2008-12-22T00:00:00", "dateUpdated": "2024-08-07T11:04:44.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0592 (GCVE-0-2003-0592)
Vulnerability from cvelistv5
Published
2004-03-16 05:00
Modified
2024-08-08 01:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:58:11.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040310 Corsaire Security Advisory: Multiple vendor HTTP user agent cookie path traversal issue", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html" }, { "name": "20040310 Corsaire Security Advisory: Multiple vendor HTTP user agent cookie path traversal issue", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html" }, { "name": "DSA-459", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-459" }, { "name": "oval:org.mitre.oval:def:823", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A823" }, { "name": "RHSA-2004:074", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-074.html" }, { "name": "MDKSA-2004:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via \"%2e%2e\" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040310 Corsaire Security Advisory: Multiple vendor HTTP user agent cookie path traversal issue", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html" }, { "name": "20040310 Corsaire Security Advisory: Multiple vendor HTTP user agent cookie path traversal issue", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html" }, { "name": "DSA-459", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-459" }, { "name": "oval:org.mitre.oval:def:823", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A823" }, { "name": "RHSA-2004:074", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-074.html" }, { "name": "MDKSA-2004:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:022" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0592", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via \"%2e%2e\" (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040310 Corsaire Security Advisory: Multiple vendor HTTP user agent cookie path traversal issue", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html" }, { "name": "20040310 Corsaire Security Advisory: Multiple vendor HTTP user agent cookie path traversal issue", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html" }, { "name": "DSA-459", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-459" }, { "name": "oval:org.mitre.oval:def:823", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A823" }, { "name": "RHSA-2004:074", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-074.html" }, { "name": "MDKSA-2004:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:022" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0592", "datePublished": "2004-03-16T05:00:00", "dateReserved": "2003-07-18T00:00:00", "dateUpdated": "2024-08-08T01:58:11.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6591 (GCVE-0-2007-6591)
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:11:06.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3498", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3498" }, { "name": "20071118 Re: Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483937/100/100/threaded" }, { "name": "20071118 RE: Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483960/100/100/threaded" }, { "name": "20071118 Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483929/100/100/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://nils.toedtmann.net/pub/subjectAltName.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3498", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3498" }, { "name": "20071118 Re: Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483937/100/100/threaded" }, { "name": "20071118 RE: Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483960/100/100/threaded" }, { "name": "20071118 Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483929/100/100/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://nils.toedtmann.net/pub/subjectAltName.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6591", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror 3.5.5 and 3.95.00, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regards the certificate as also accepted for all domain names in subjectAltName:dNSName fields, even though these fields cannot be examined in the product, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3498", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3498" }, { "name": "20071118 Re: Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483937/100/100/threaded" }, { "name": "20071118 RE: Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483960/100/100/threaded" }, { "name": "20071118 Certificate spoofing issue with Mozilla, Konqueror, Safari 2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483929/100/100/threaded" }, { "name": "http://nils.toedtmann.net/pub/subjectAltName.txt", "refsource": "MISC", "url": "http://nils.toedtmann.net/pub/subjectAltName.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6591", "datePublished": "2007-12-28T21:00:00", "dateReserved": "2007-12-28T00:00:00", "dateUpdated": "2024-08-07T16:11:06.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3820 (GCVE-0-2007-3820)
Vulnerability from cvelistv5
Published
2007-07-17 01:00
Modified
2024-08-07 14:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://alt.swiecki.net/oper1.html" }, { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "FEDORA-2007-716", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "name": "FEDORA-2007-2361", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "24918", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24918" }, { "name": "RHSA-2007:0905", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "name": "USN-502-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "26091", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26091" }, { "name": "27106", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27106" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27108" }, { "name": "opera-konqueror-addressbar-spoofing(35430)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35430" }, { "name": "oval:org.mitre.oval:def:10345", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345" }, { "name": "27090", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27090" }, { "name": "ADV-2007-2538", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2538" }, { "name": "27089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27096" }, { "name": "20070713 Opera/Konqueror: data: URL scheme address bar spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/473703/100/0/threaded" }, { "name": "20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/473712/100/0/threaded" }, { "name": "26720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26720" }, { "name": "24912", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24912" }, { "name": "MDKSA-2007:176", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "name": "1018396", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018396" }, { "name": "2905", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2905" }, { "name": "37242", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37242" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://alt.swiecki.net/oper1.html" }, { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "FEDORA-2007-716", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "name": "FEDORA-2007-2361", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "24918", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24918" }, { "name": "RHSA-2007:0905", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "name": "USN-502-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "26091", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26091" }, { "name": "27106", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27106" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27108" }, { "name": "opera-konqueror-addressbar-spoofing(35430)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35430" }, { "name": "oval:org.mitre.oval:def:10345", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345" }, { "name": "27090", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27090" }, { "name": "ADV-2007-2538", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2538" }, { "name": "27089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27096" }, { "name": "20070713 Opera/Konqueror: data: URL scheme address bar spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/473703/100/0/threaded" }, { "name": "20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/473712/100/0/threaded" }, { "name": "26720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26720" }, { "name": "24912", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24912" }, { "name": "MDKSA-2007:176", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "name": "1018396", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018396" }, { "name": "2905", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2905" }, { "name": "37242", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37242" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3820", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://alt.swiecki.net/oper1.html", "refsource": "MISC", "url": "http://alt.swiecki.net/oper1.html" }, { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "FEDORA-2007-716", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "name": "FEDORA-2007-2361", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "24918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24918" }, { "name": "RHSA-2007:0905", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "name": "USN-502-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "26091", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26091" }, { "name": "27106", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27106" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "opera-konqueror-addressbar-spoofing(35430)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35430" }, { "name": "oval:org.mitre.oval:def:10345", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10345" }, { "name": "27090", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27090" }, { "name": "ADV-2007-2538", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2538" }, { "name": "27089", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27096" }, { "name": "20070713 Opera/Konqueror: data: URL scheme address bar spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/473703/100/0/threaded" }, { "name": "20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/473712/100/0/threaded" }, { "name": "26720", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26720" }, { "name": "24912", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24912" }, { "name": "MDKSA-2007:176", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "http://www.kde.org/info/security/advisory-20070816-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "name": "1018396", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018396" }, { "name": "2905", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2905" }, { "name": "37242", "refsource": "OSVDB", "url": "http://osvdb.org/37242" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3820", "datePublished": "2007-07-17T01:00:00", "dateReserved": "2007-07-16T00:00:00", "dateUpdated": "2024-08-07T14:28:52.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0721 (GCVE-0-2004-0721)
Vulnerability from cvelistv5
Published
2004-07-23 04:00
Modified
2024-08-08 00:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:27.114Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "http-frame-spoof(1598)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1598" }, { "name": "CLA-2004:864", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "name": "11978", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11978" }, { "name": "oval:org.mitre.oval:def:11371", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11371" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20040811-3.txt" }, { "name": "200408-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200408-13.xml" }, { "name": "20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109225538901170\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/multiple_browsers_frame_injection_vulnerability_test/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "http-frame-spoof(1598)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1598" }, { "name": "CLA-2004:864", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "name": "11978", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11978" }, { "name": "oval:org.mitre.oval:def:11371", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11371" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20040811-3.txt" }, { "name": "200408-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200408-13.xml" }, { "name": "20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109225538901170\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/multiple_browsers_frame_injection_vulnerability_test/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0721", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http-frame-spoof(1598)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1598" }, { "name": "CLA-2004:864", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "name": "11978", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11978" }, { "name": "oval:org.mitre.oval:def:11371", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11371" }, { "name": "http://www.kde.org/info/security/advisory-20040811-3.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20040811-3.txt" }, { "name": "200408-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200408-13.xml" }, { "name": "20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109225538901170\u0026w=2" }, { "name": "http://secunia.com/multiple_browsers_frame_injection_vulnerability_test/", "refsource": "MISC", "url": "http://secunia.com/multiple_browsers_frame_injection_vulnerability_test/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0721", "datePublished": "2004-07-23T04:00:00", "dateReserved": "2004-07-22T00:00:00", "dateUpdated": "2024-08-08T00:24:27.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4512 (GCVE-0-2012-4512)
Vulnerability from cvelistv5
Published
2020-02-08 18:09
Modified
2024-08-06 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via a crafted font face source, related to "type confusion."
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-11/0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/11/11" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/30/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://quickgit.kde.org/index.php?p=kdelibs.git\u0026a=commitdiff\u0026h=a872c8a969a8bd3706253d6ba24088e4f07f3352" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1416.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1418.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027709" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/advisories/51097" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/advisories/51145" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Konqueror", "vendor": "KDE", "versions": [ { "status": "affected", "version": "4.7.3" } ] } ], "datePublic": "2012-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via a crafted font face source, related to \"type confusion.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-08T18:09:56", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc" }, { "tags": [ "x_refsource_MISC" ], "url": "http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-11/0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/11/11" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/30/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://quickgit.kde.org/index.php?p=kdelibs.git\u0026a=commitdiff\u0026h=a872c8a969a8bd3706253d6ba24088e4f07f3352" }, { "tags": [ "x_refsource_MISC" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1416.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1418.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securitytracker.com/id?1027709" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/advisories/51097" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/advisories/51145" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4512", "datePublished": "2020-02-08T18:09:56", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-0537 (GCVE-0-2007-0537)
Vulnerability from cvelistv5
Published
2007-01-29 16:00
Modified
2024-08-07 12:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:19:30.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27108" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27108" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24442" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "name": "http://www.kde.org/info/security/advisory-20070206-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "refsource": "OSVDB", "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "https://issues.rpath.com/browse/RPL-1117", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24442" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0537", "datePublished": "2007-01-29T16:00:00", "dateReserved": "2007-01-29T00:00:00", "dateUpdated": "2024-08-07T12:19:30.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0459 (GCVE-0-2003-0459)
Vulnerability from cvelistv5
Published
2003-08-01 04:00
Modified
2024-08-08 01:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the "user:password@host" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:58:09.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030729 KDE Security Advisory: Konqueror Referrer Authentication Leak", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007300.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20030729-1.txt" }, { "name": "CLA-2003:747", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747" }, { "name": "DSA-361", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-361" }, { "name": "oval:org.mitre.oval:def:411", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A411" }, { "name": "20030802 [slackware-security] KDE packages updated (SSA:2003-213-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=105986238428061\u0026w=2" }, { "name": "RHSA-2003:236", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-236.html" }, { "name": "RHSA-2003:235", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-235.html" }, { "name": "TLSA-2003-45", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/security/TLSA-2003-45.txt" }, { "name": "MDKSA-2003:079", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the \"user:password@host\" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030729 KDE Security Advisory: Konqueror Referrer Authentication Leak", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007300.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20030729-1.txt" }, { "name": "CLA-2003:747", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747" }, { "name": "DSA-361", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-361" }, { "name": "oval:org.mitre.oval:def:411", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A411" }, { "name": "20030802 [slackware-security] KDE packages updated (SSA:2003-213-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=105986238428061\u0026w=2" }, { "name": "RHSA-2003:236", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-236.html" }, { "name": "RHSA-2003:235", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-235.html" }, { "name": "TLSA-2003-45", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/security/TLSA-2003-45.txt" }, { "name": "MDKSA-2003:079", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the \"user:password@host\" form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030729 KDE Security Advisory: Konqueror Referrer Authentication Leak", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007300.html" }, { "name": "http://www.kde.org/info/security/advisory-20030729-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20030729-1.txt" }, { "name": "CLA-2003:747", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000747" }, { "name": "DSA-361", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-361" }, { "name": "oval:org.mitre.oval:def:411", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A411" }, { "name": "20030802 [slackware-security] KDE packages updated (SSA:2003-213-01)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=105986238428061\u0026w=2" }, { "name": "RHSA-2003:236", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-236.html" }, { "name": "RHSA-2003:235", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-235.html" }, { "name": "TLSA-2003-45", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/TLSA-2003-45.txt" }, { "name": "MDKSA-2003:079", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0459", "datePublished": "2003-08-01T04:00:00", "dateReserved": "2003-06-26T00:00:00", "dateUpdated": "2024-08-08T01:58:09.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6000 (GCVE-0-2007-6000)
Vulnerability from cvelistv5
Published
2007-11-15 22:00
Modified
2024-08-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror 3.5.6 and earlier allows remote attackers to cause a denial of service (crash) via large HTTP cookie parameters.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3370", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3370" }, { "name": "konqueror-cookie-dos(38456)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38456" }, { "name": "26435", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26435" }, { "name": "20071114 Konqueror Remote Denial Of Service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483705/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.6 and earlier allows remote attackers to cause a denial of service (crash) via large HTTP cookie parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3370", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3370" }, { "name": "konqueror-cookie-dos(38456)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38456" }, { "name": "26435", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26435" }, { "name": "20071114 Konqueror Remote Denial Of Service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483705/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror 3.5.6 and earlier allows remote attackers to cause a denial of service (crash) via large HTTP cookie parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3370", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3370" }, { "name": "konqueror-cookie-dos(38456)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38456" }, { "name": "26435", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26435" }, { "name": "20071114 Konqueror Remote Denial Of Service", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483705/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6000", "datePublished": "2007-11-15T22:00:00", "dateReserved": "2007-11-15T00:00:00", "dateUpdated": "2024-08-07T15:47:00.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-4976 (GCVE-0-2009-4976)
Vulnerability from cvelistv5
Published
2010-08-02 20:00
Modified
2024-08-07 07:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in webkitpart.cpp in kwebkitpart allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a "universal XSS" issue, a similar vulnerability to CVE-2010-2536.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:53.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "kwebkitpart-webkitpart-xss(60878)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://websvn.kde.org/?view=rev\u0026revision=1059140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.kde.org/show_bug.cgi?id=217464" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in webkitpart.cpp in kwebkitpart allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a \"universal XSS\" issue, a similar vulnerability to CVE-2010-2536." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "kwebkitpart-webkitpart-xss(60878)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://websvn.kde.org/?view=rev\u0026revision=1059140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.kde.org/show_bug.cgi?id=217464" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4976", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in webkitpart.cpp in kwebkitpart allows remote attackers to inject arbitrary web script or HTML via a URL associated with a nonexistent domain name, related to a \"universal XSS\" issue, a similar vulnerability to CVE-2010-2536." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "kwebkitpart-webkitpart-xss(60878)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878" }, { "name": "http://websvn.kde.org/?view=rev\u0026revision=1059140", "refsource": "CONFIRM", "url": "http://websvn.kde.org/?view=rev\u0026revision=1059140" }, { "name": "https://bugs.kde.org/show_bug.cgi?id=217464", "refsource": "CONFIRM", "url": "https://bugs.kde.org/show_bug.cgi?id=217464" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4976", "datePublished": "2010-08-02T20:00:00", "dateReserved": "2010-08-02T00:00:00", "dateUpdated": "2024-08-07T07:24:53.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0867 (GCVE-0-2004-0867)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session. NOTE: it was later reported that 2.x is also affected.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "name": "12580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12580/" }, { "name": "1011331", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011331" }, { "name": "web-browser-session-hijack(17415)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=252342" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html" }, { "name": "11186", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session. NOTE: it was later reported that 2.x is also affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "name": "12580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12580/" }, { "name": "1011331", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011331" }, { "name": "web-browser-session-hijack(17415)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=252342" }, { "tags": [ "x_refsource_MISC" ], "url": "http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html" }, { "name": "11186", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session. NOTE: it was later reported that 2.x is also affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "name": "12580", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12580/" }, { "name": "1011331", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011331" }, { "name": "web-browser-session-hijack(17415)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=252342", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=252342" }, { "name": "http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html", "refsource": "MISC", "url": "http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html" }, { "name": "11186", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11186" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0867", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-09-14T00:00:00", "dateUpdated": "2024-08-08T00:31:47.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0411 (GCVE-0-2004-0411)
Vulnerability from cvelistv5
Published
2004-05-20 04:00
Modified
2024-08-08 00:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2004:222", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-222.html" }, { "name": "SuSE-SA:2003:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20040517-1.txt" }, { "name": "kde-url-handler-gain-access(16163)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16163" }, { "name": "FEDORA-2004-121", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/6717" }, { "name": "20040513 Opera Telnet URI Handler Vulnerability also applies to other browsers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/363225" }, { "name": "DSA-518", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-518" }, { "name": "FEDORA-2004-122", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/6743" }, { "name": "6107", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6107" }, { "name": "20040517 KDE Security Advisory: URI Handler Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108481412427344\u0026w=2" }, { "name": "11602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11602" }, { "name": "CLA-2004:843", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000843" }, { "name": "SSA:2004-238", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.362635" }, { "name": "GLSA-200405-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-11.xml" }, { "name": "oval:org.mitre.oval:def:954", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954" }, { "name": "10358", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10358" }, { "name": "O-146", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-146.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter \"-\" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2004:222", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-222.html" }, { "name": "SuSE-SA:2003:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20040517-1.txt" }, { "name": "kde-url-handler-gain-access(16163)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16163" }, { "name": "FEDORA-2004-121", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/advisories/6717" }, { "name": "20040513 Opera Telnet URI Handler Vulnerability also applies to other browsers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/363225" }, { "name": "DSA-518", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-518" }, { "name": "FEDORA-2004-122", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/advisories/6743" }, { "name": "6107", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6107" }, { "name": "20040517 KDE Security Advisory: URI Handler Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108481412427344\u0026w=2" }, { "name": "11602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11602" }, { "name": "CLA-2004:843", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000843" }, { "name": "SSA:2004-238", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.362635" }, { "name": "GLSA-200405-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-11.xml" }, { "name": "oval:org.mitre.oval:def:954", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954" }, { "name": "10358", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10358" }, { "name": "O-146", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-146.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter \"-\" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:222", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-222.html" }, { "name": "SuSE-SA:2003:014", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html" }, { "name": "http://www.kde.org/info/security/advisory-20040517-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20040517-1.txt" }, { "name": "kde-url-handler-gain-access(16163)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16163" }, { "name": "FEDORA-2004-121", "refsource": "FEDORA", "url": "http://www.securityfocus.com/advisories/6717" }, { "name": "20040513 Opera Telnet URI Handler Vulnerability also applies to other browsers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/363225" }, { "name": "DSA-518", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-518" }, { "name": "FEDORA-2004-122", "refsource": "FEDORA", "url": "http://www.securityfocus.com/advisories/6743" }, { "name": "6107", "refsource": "OSVDB", "url": "http://www.osvdb.org/6107" }, { "name": "20040517 KDE Security Advisory: URI Handler Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108481412427344\u0026w=2" }, { "name": "11602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11602" }, { "name": "CLA-2004:843", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000843" }, { "name": "SSA:2004-238", "refsource": "SLACKWARE", "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.362635" }, { "name": "GLSA-200405-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-11.xml" }, { "name": "oval:org.mitre.oval:def:954", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954" }, { "name": "10358", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10358" }, { "name": "O-146", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-146.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0411", "datePublished": "2004-05-20T04:00:00", "dateReserved": "2004-04-16T00:00:00", "dateUpdated": "2024-08-08T00:17:14.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1165 (GCVE-0-2004-1165)
Vulnerability from cvelistv5
Published
2004-12-10 05:00
Modified
2024-08-08 00:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:01.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2005:065", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-065.html" }, { "name": "GLSA-200501-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-18.xml" }, { "name": "oval:org.mitre.oval:def:9645", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645" }, { "name": "web-browser-ftp-command-execution(18384)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18384" }, { "name": "DSA-631", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-631" }, { "name": "20041205 7a69Adv#16 - Konqueror FTP command injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110245752232681\u0026w=2" }, { "name": "RHSA-2005:009", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "name": "MDKSA-2005:045", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline (\"%0a\") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2005:065", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-065.html" }, { "name": "GLSA-200501-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-18.xml" }, { "name": "oval:org.mitre.oval:def:9645", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645" }, { "name": "web-browser-ftp-command-execution(18384)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18384" }, { "name": "DSA-631", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-631" }, { "name": "20041205 7a69Adv#16 - Konqueror FTP command injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110245752232681\u0026w=2" }, { "name": "RHSA-2005:009", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "name": "MDKSA-2005:045", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:045" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline (\"%0a\") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2005:065", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-065.html" }, { "name": "GLSA-200501-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-18.xml" }, { "name": "oval:org.mitre.oval:def:9645", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645" }, { "name": "web-browser-ftp-command-execution(18384)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18384" }, { "name": "DSA-631", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-631" }, { "name": "20041205 7a69Adv#16 - Konqueror FTP command injection", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110245752232681\u0026w=2" }, { "name": "RHSA-2005:009", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "name": "MDKSA-2005:045", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:045" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1165", "datePublished": "2004-12-10T05:00:00", "dateReserved": "2004-12-09T00:00:00", "dateUpdated": "2024-08-08T00:39:01.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1151 (GCVE-0-2002-1151)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2002:220", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20020908-2.txt" }, { "name": "ie-sameoriginpolicy-bypass(10039)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10039.php" }, { "name": "MDKSA-2002:064", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php" }, { "name": "DSA-167", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-167" }, { "name": "RHSA-2002:221", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "name": "CLA-2002:525", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000525" }, { "name": "5689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5689" }, { "name": "7867", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/7867" }, { "name": "CSSA-2002-047.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "name": "20020910 KDE Security Advisory: Konqueror Cross Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103175850925395\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-18T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2002:220", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20020908-2.txt" }, { "name": "ie-sameoriginpolicy-bypass(10039)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10039.php" }, { "name": "MDKSA-2002:064", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php" }, { "name": "DSA-167", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-167" }, { "name": "RHSA-2002:221", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "name": "CLA-2002:525", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000525" }, { "name": "5689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5689" }, { "name": "7867", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/7867" }, { "name": "CSSA-2002-047.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "name": "20020910 KDE Security Advisory: Konqueror Cross Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103175850925395\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1151", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2002:220", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "name": "http://www.kde.org/info/security/advisory-20020908-2.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20020908-2.txt" }, { "name": "ie-sameoriginpolicy-bypass(10039)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10039.php" }, { "name": "MDKSA-2002:064", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-064.php" }, { "name": "DSA-167", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-167" }, { "name": "RHSA-2002:221", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "name": "CLA-2002:525", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000525" }, { "name": "5689", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5689" }, { "name": "7867", "refsource": "OSVDB", "url": "http://www.osvdb.org/7867" }, { "name": "CSSA-2002-047.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" }, { "name": "20020910 KDE Security Advisory: Konqueror Cross Site Scripting Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103175850925395\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1151", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-09-24T00:00:00", "dateUpdated": "2024-08-08T03:12:16.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4684 (GCVE-0-2005-4684)
Vulnerability from cvelistv5
Published
2006-02-01 02:00
Modified
2024-08-07 23:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:53:28.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15331", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15331" }, { "name": "20051104 Browser cookie handling: possible cross-domain cookie sharing", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html" }, { "name": "konqueror-cookie-information-disclosure(25291)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15331", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15331" }, { "name": "20051104 Browser cookie handling: possible cross-domain cookie sharing", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html" }, { "name": "konqueror-cookie-information-disclosure(25291)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15331", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15331" }, { "name": "20051104 Browser cookie handling: possible cross-domain cookie sharing", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html" }, { "name": "konqueror-cookie-information-disclosure(25291)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4684", "datePublished": "2006-02-01T02:00:00", "dateReserved": "2006-01-31T00:00:00", "dateUpdated": "2024-08-07T23:53:28.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1308 (GCVE-0-2007-1308)
Vulnerability from cvelistv5
Published
2007-03-07 00:00
Modified
2024-08-07 12:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:50:35.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22814", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22814" }, { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "20070304 Konqueror DoS Via JavaScript Read Of FTP Iframe", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/461897/100/0/threaded" }, { "name": "20070304 Konqueror DoS Via JavaScript Read Of FTP Iframe", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052793.html" }, { "name": "ADV-2007-0886", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0886" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bindshell.net/advisories/konq355/konq355-patch.diff" }, { "name": "USN-447-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "name": "MDKSA-2007:054", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:054" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27108" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bindshell.net/advisories/konq355" }, { "name": "oval:org.mitre.oval:def:10551", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10551" }, { "name": "2345", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2345" }, { "name": "konqueror-ftp-dos(32798)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32798" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22814", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22814" }, { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "20070304 Konqueror DoS Via JavaScript Read Of FTP Iframe", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/461897/100/0/threaded" }, { "name": "20070304 Konqueror DoS Via JavaScript Read Of FTP Iframe", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052793.html" }, { "name": "ADV-2007-0886", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0886" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bindshell.net/advisories/konq355/konq355-patch.diff" }, { "name": "USN-447-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "name": "MDKSA-2007:054", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:054" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27108" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bindshell.net/advisories/konq355" }, { "name": "oval:org.mitre.oval:def:10551", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10551" }, { "name": "2345", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2345" }, { "name": "konqueror-ftp-dos(32798)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32798" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22814", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22814" }, { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "20070304 Konqueror DoS Via JavaScript Read Of FTP Iframe", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/461897/100/0/threaded" }, { "name": "20070304 Konqueror DoS Via JavaScript Read Of FTP Iframe", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052793.html" }, { "name": "ADV-2007-0886", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0886" }, { "name": "http://bindshell.net/advisories/konq355/konq355-patch.diff", "refsource": "MISC", "url": "http://bindshell.net/advisories/konq355/konq355-patch.diff" }, { "name": "USN-447-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "name": "MDKSA-2007:054", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:054" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "http://bindshell.net/advisories/konq355", "refsource": "MISC", "url": "http://bindshell.net/advisories/konq355" }, { "name": "oval:org.mitre.oval:def:10551", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10551" }, { "name": "2345", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2345" }, { "name": "konqueror-ftp-dos(32798)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32798" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1308", "datePublished": "2007-03-07T00:00:00", "dateReserved": "2007-03-06T00:00:00", "dateUpdated": "2024-08-07T12:50:35.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1158 (GCVE-0-2004-1158)
Vulnerability from cvelistv5
Published
2004-12-10 05:00
Modified
2024-08-08 00:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:00.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13486", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13486" }, { "name": "oval:org.mitre.oval:def:11056", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056" }, { "name": "13254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13254" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/multiple_browsers_window_injection_vulnerability_test/" }, { "name": "13560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13560" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2004-13/advisory/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20041213-1.txt" }, { "name": "SUSE-SR:2005:001", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "RHSA-2005:009", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "name": "20041213 KDE Security Advisory: Konqueror Window Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110296048613575\u0026w=2" }, { "name": "13477", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13477" }, { "name": "11853", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11853" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the \"window injection\" vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13486", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13486" }, { "name": "oval:org.mitre.oval:def:11056", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056" }, { "name": "13254", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13254" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/multiple_browsers_window_injection_vulnerability_test/" }, { "name": "13560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13560" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2004-13/advisory/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20041213-1.txt" }, { "name": "SUSE-SR:2005:001", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "RHSA-2005:009", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "name": "20041213 KDE Security Advisory: Konqueror Window Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110296048613575\u0026w=2" }, { "name": "13477", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13477" }, { "name": "11853", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11853" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1158", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the \"window injection\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13486", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13486" }, { "name": "oval:org.mitre.oval:def:11056", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056" }, { "name": "13254", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13254" }, { "name": "http://secunia.com/multiple_browsers_window_injection_vulnerability_test/", "refsource": "MISC", "url": "http://secunia.com/multiple_browsers_window_injection_vulnerability_test/" }, { "name": "13560", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13560" }, { "name": "http://secunia.com/secunia_research/2004-13/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2004-13/advisory/" }, { "name": "http://www.kde.org/info/security/advisory-20041213-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20041213-1.txt" }, { "name": "SUSE-SR:2005:001", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_01_sr.html" }, { "name": "RHSA-2005:009", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-009.html" }, { "name": "20041213 KDE Security Advisory: Konqueror Window Injection Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110296048613575\u0026w=2" }, { "name": "13477", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13477" }, { "name": "11853", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11853" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1158", "datePublished": "2004-12-10T05:00:00", "dateReserved": "2004-12-08T00:00:00", "dateUpdated": "2024-08-08T00:39:00.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0237 (GCVE-0-2005-0237)
Vulnerability from cvelistv5
Published
2005-02-07 05:00
Modified
2024-08-07 21:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:25.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20050316-2.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.shmoo.com/idn" }, { "name": "20050206 Re: state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031460.html" }, { "name": "FLSA:178606", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427976/100/0/threaded" }, { "name": "MDKSA-2005:058", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:058" }, { "name": "14162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14162" }, { "name": "RHSA-2005:325", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-325.html" }, { "name": "oval:org.mitre.oval:def:10671", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10671" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12461" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn/homograph.txt" }, { "name": "multiple-browsers-idn-spoof(19236)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19236" }, { "name": "20050206 state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20050316-2.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.shmoo.com/idn" }, { "name": "20050206 Re: state of homograph attacks", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031460.html" }, { "name": "FLSA:178606", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/427976/100/0/threaded" }, { "name": "MDKSA-2005:058", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:058" }, { "name": "14162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14162" }, { "name": "RHSA-2005:325", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-325.html" }, { "name": "oval:org.mitre.oval:def:10671", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10671" }, { "name": "12461", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12461" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0237", "datePublished": "2005-02-07T05:00:00", "dateReserved": "2005-02-07T00:00:00", "dateUpdated": "2024-08-07T21:05:25.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0870 (GCVE-0-2004-0870)
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://securityfocus.com/archive/1/375407" }, { "name": "1011330", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011330" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" }, { "name": "web-browser-cookie-session-hijack(17417)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17417" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka \"Cross Security Boundary Cookie Injection.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://securityfocus.com/archive/1/375407" }, { "name": "1011330", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011330" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" }, { "name": "web-browser-cookie-session-hijack(17417)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17417" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka \"Cross Security Boundary Cookie Injection.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://securityfocus.com/archive/1/375407" }, { "name": "1011330", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011330" }, { "name": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt", "refsource": "MISC", "url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" }, { "name": "web-browser-cookie-session-hijack(17417)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17417" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0870", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2004-09-14T00:00:00", "dateUpdated": "2024-08-08T00:31:47.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1478 (GCVE-0-2003-1478)
Vulnerability from cvelistv5
Published
2007-10-24 23:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror in KDE 3.0.3 allows remote attackers to cause a denial of service (core dump) via a web page that begins with a "xFFxFE" byte sequence and a large number of CRLF sequences, as demonstrated using freeze.htm.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "7486", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7486" }, { "name": "kde-konqueror-dos(11971)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11971" }, { "name": "20030502 Re: April appeared to be a month of IE bugs. Here", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/320266" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.0.3 allows remote attackers to cause a denial of service (core dump) via a web page that begins with a \"xFFxFE\" byte sequence and a large number of CRLF sequences, as demonstrated using freeze.htm." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "7486", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7486" }, { "name": "kde-konqueror-dos(11971)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11971" }, { "name": "20030502 Re: April appeared to be a month of IE bugs. Here", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/320266" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror in KDE 3.0.3 allows remote attackers to cause a denial of service (core dump) via a web page that begins with a \"xFFxFE\" byte sequence and a large number of CRLF sequences, as demonstrated using freeze.htm." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "7486", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7486" }, { "name": "kde-konqueror-dos(11971)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11971" }, { "name": "20030502 Re: April appeared to be a month of IE bugs. Here", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/320266" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1478", "datePublished": "2007-10-24T23:00:00", "dateReserved": "2007-10-24T00:00:00", "dateUpdated": "2024-08-08T02:28:03.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3672 (GCVE-0-2006-3672)
Vulnerability from cvelistv5
Published
2006-07-18 01:00
Modified
2024-08-07 18:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:39:53.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2006:130", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:130" }, { "name": "27058", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/27058" }, { "name": "18978", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18978" }, { "name": "konqueror-replacechild-dos(27744)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27744" }, { "name": "ADV-2006-2812", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2812" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html" }, { "name": "USN-322-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-322-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDKSA-2006:130", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:130" }, { "name": "27058", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/27058" }, { "name": "18978", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18978" }, { "name": "konqueror-replacechild-dos(27744)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27744" }, { "name": "ADV-2006-2812", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2812" }, { "tags": [ "x_refsource_MISC" ], "url": "http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html" }, { "name": "USN-322-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-322-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3672", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2006:130", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:130" }, { "name": "27058", "refsource": "OSVDB", "url": "http://www.osvdb.org/27058" }, { "name": "18978", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18978" }, { "name": "konqueror-replacechild-dos(27744)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27744" }, { "name": "ADV-2006-2812", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2812" }, { "name": "http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html", "refsource": "MISC", "url": "http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html" }, { "name": "USN-322-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-322-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3672", "datePublished": "2006-07-18T01:00:00", "dateReserved": "2006-07-17T00:00:00", "dateUpdated": "2024-08-07T18:39:53.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1565 (GCVE-0-2007-1565)
Vulnerability from cvelistv5
Published
2007-03-21 19:00
Modified
2024-09-16 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror 3.5.5 allows remote attackers to cause a denial of service (crash) by using JavaScript to read a child iframe having an ftp:// URI.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Konqueror 3.5.5 allows remote attackers to cause a denial of service (crash) by using JavaScript to read a child iframe having an ftp:// URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-03-21T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror 3.5.5 allows remote attackers to cause a denial of service (crash) by using JavaScript to read a child iframe having an ftp:// URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf", "refsource": "MISC", "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1565", "datePublished": "2007-03-21T19:00:00Z", "dateReserved": "2007-03-21T00:00:00Z", "dateUpdated": "2024-09-16T19:25:44.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4224 (GCVE-0-2007-4224)
Vulnerability from cvelistv5
Published
2007-08-08 21:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "2982", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2982" }, { "name": "27271", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27271" }, { "name": "FEDORA-2007-716", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "name": "FEDORA-2007-2361", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "20070806 Re: Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/475731/100/0/threaded" }, { "name": "RHSA-2007:0905", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "name": "USN-502-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "20070806 Re: Konqueror: URL address bar spoofingvulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/475730/100/0/threaded" }, { "name": "konqueror-setinterval-spoofing(35828)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35828" }, { "name": "ADV-2007-2807", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "name": "27106", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27106" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27108" }, { "name": "26351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26351" }, { "name": "25219", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25219" }, { "name": "26690", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26690" }, { "name": "1018579", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018579" }, { "name": "27090", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27090" }, { "name": "SUSE-SR:2007:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html" }, { "name": "27089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27096" }, { "name": "26720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26720" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1615" }, { "name": "MDKSA-2007:176", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "name": "20070807 Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/475763/100/0/threaded" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/475689/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9879", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-06T00:00:00", "descriptions": [ { "lang": "en", "value": "KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "2982", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2982" }, { "name": "27271", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27271" }, { "name": "FEDORA-2007-716", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "name": "FEDORA-2007-2361", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "20070806 Re: Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/475731/100/0/threaded" }, { "name": "RHSA-2007:0905", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "name": "USN-502-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "20070806 Re: Konqueror: URL address bar spoofingvulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/475730/100/0/threaded" }, { "name": "konqueror-setinterval-spoofing(35828)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35828" }, { "name": "ADV-2007-2807", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "name": "27106", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27106" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27108" }, { "name": "26351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26351" }, { "name": "25219", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25219" }, { "name": "26690", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26690" }, { "name": "1018579", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018579" }, { "name": "27090", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27090" }, { "name": "SUSE-SR:2007:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html" }, { "name": "27089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27096" }, { "name": "26720", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26720" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1615" }, { "name": "MDKSA-2007:176", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "name": "20070807 Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/475763/100/0/threaded" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/475689/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9879", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "2982", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2982" }, { "name": "27271", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27271" }, { "name": "FEDORA-2007-716", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00085.html" }, { "name": "FEDORA-2007-2361", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00022.html" }, { "name": "20070806 Re: Konqueror: URL address bar spoofing vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/475731/100/0/threaded" }, { "name": "RHSA-2007:0905", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0905.html" }, { "name": "USN-502-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-502-1" }, { "name": "20070806 Re: Konqueror: URL address bar spoofingvulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/475730/100/0/threaded" }, { "name": "konqueror-setinterval-spoofing(35828)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35828" }, { "name": "ADV-2007-2807", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2807" }, { "name": "27106", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27106" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "26351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26351" }, { "name": "25219", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25219" }, { "name": "26690", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26690" }, { "name": "1018579", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018579" }, { "name": "27090", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27090" }, { "name": "SUSE-SR:2007:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html" }, { "name": "27089", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27089" }, { "name": "26612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26612" }, { "name": "27096", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27096" }, { "name": "26720", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26720" }, { "name": "https://issues.rpath.com/browse/RPL-1615", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1615" }, { "name": "MDKSA-2007:176", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:176" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065101.html" }, { "name": "http://www.kde.org/info/security/advisory-20070816-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070816-1.txt" }, { "name": "20070807 Re: [Full-disclosure] Konqueror: URL address bar spoofing vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/475763/100/0/threaded" }, { "name": "20070806 Konqueror: URL address bar spoofing vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/475689/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9879", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9879" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4224", "datePublished": "2007-08-08T21:00:00", "dateReserved": "2007-08-08T00:00:00", "dateUpdated": "2024-08-07T14:46:39.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0746 (GCVE-0-2004-0746)
Vulnerability from cvelistv5
Published
2004-09-14 04:00
Modified
2024-08-08 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "12341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12341" }, { "name": "kde-konqueror-cookie-set(17063)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17063" }, { "name": "CLA-2004:864", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "name": "MDKSA-2004:086", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:086" }, { "name": "10991", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20040823-1.txt" }, { "name": "oval:org.mitre.oval:def:11281", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11281" }, { "name": "20040823 KDE Security Advisory: Konqueror Cross-Domain Cookie Injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109327681304401\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "12341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12341" }, { "name": "kde-konqueror-cookie-set(17063)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17063" }, { "name": "CLA-2004:864", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "name": "MDKSA-2004:086", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:086" }, { "name": "10991", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20040823-1.txt" }, { "name": "oval:org.mitre.oval:def:11281", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11281" }, { "name": "20040823 KDE Security Advisory: Konqueror Cross-Domain Cookie Injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109327681304401\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "12341", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12341" }, { "name": "kde-konqueror-cookie-set(17063)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17063" }, { "name": "CLA-2004:864", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000864" }, { "name": "MDKSA-2004:086", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:086" }, { "name": "10991", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10991" }, { "name": "http://www.kde.org/info/security/advisory-20040823-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20040823-1.txt" }, { "name": "oval:org.mitre.oval:def:11281", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11281" }, { "name": "20040823 KDE Security Advisory: Konqueror Cross-Domain Cookie Injection", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109327681304401\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0746", "datePublished": "2004-09-14T04:00:00", "dateReserved": "2004-07-26T00:00:00", "dateUpdated": "2024-08-08T00:31:46.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0970 (GCVE-0-2002-0970)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ssl-ca-certificate-spoofing(9776)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776" }, { "name": "RHSA-2002:220", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "name": "5410", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5410" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20020818-1.txt" }, { "name": "20020812 Re: IE SSL Vulnerability (Konqueror affected too)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=102918241005893\u0026w=2" }, { "name": "CLA-2002:519", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000519" }, { "name": "RHSA-2002:221", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "name": "20020818 KDE Security Advisory: Konqueror SSL vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-08/0170.html" }, { "name": "DSA-155", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-155" }, { "name": "MDKSA-2002:058", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:058" }, { "name": "CSSA-2002-047.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-18T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ssl-ca-certificate-spoofing(9776)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776" }, { "name": "RHSA-2002:220", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "name": "5410", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5410" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20020818-1.txt" }, { "name": "20020812 Re: IE SSL Vulnerability (Konqueror affected too)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=102918241005893\u0026w=2" }, { "name": "CLA-2002:519", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000519" }, { "name": "RHSA-2002:221", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "name": "20020818 KDE Security Advisory: Konqueror SSL vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-08/0170.html" }, { "name": "DSA-155", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-155" }, { "name": "MDKSA-2002:058", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:058" }, { "name": "CSSA-2002-047.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ssl-ca-certificate-spoofing(9776)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9776" }, { "name": "RHSA-2002:220", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-220.html" }, { "name": "5410", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5410" }, { "name": "http://www.kde.org/info/security/advisory-20020818-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20020818-1.txt" }, { "name": "20020812 Re: IE SSL Vulnerability (Konqueror affected too)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102918241005893\u0026w=2" }, { "name": "CLA-2002:519", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000519" }, { "name": "RHSA-2002:221", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-221.html" }, { "name": "20020818 KDE Security Advisory: Konqueror SSL vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-08/0170.html" }, { "name": "DSA-155", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-155" }, { "name": "MDKSA-2002:058", "refsource": "MANDRAKE", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:058" }, { "name": "CSSA-2002-047.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-047.0.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0970", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-08-21T00:00:00", "dateUpdated": "2024-08-08T03:12:16.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1564 (GCVE-0-2007-1564)
Vulnerability from cvelistv5
Published
2007-03-21 19:00
Modified
2024-08-07 12:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1201" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24889" }, { "name": "USN-447-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "name": "oval:org.mitre.oval:def:10646", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10646" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20070326-1.txt" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27108" }, { "name": "1017801", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017801" }, { "name": "23091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23091" }, { "name": "ADV-2007-1076", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1076" }, { "name": "MDKSA-2007:072", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:072" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1201" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24889" }, { "name": "USN-447-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "name": "oval:org.mitre.oval:def:10646", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10646" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20070326-1.txt" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27108" }, { "name": "1017801", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017801" }, { "name": "23091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23091" }, { "name": "ADV-2007-1076", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1076" }, { "name": "MDKSA-2007:072", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:072" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "https://issues.rpath.com/browse/RPL-1201", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1201" }, { "name": "24889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24889" }, { "name": "USN-447-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-447-1" }, { "name": "oval:org.mitre.oval:def:10646", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10646" }, { "name": "SUSE-SR:2007:006", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "name": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf", "refsource": "MISC", "url": "http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf" }, { "name": "http://www.kde.org/info/security/advisory-20070326-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070326-1.txt" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "1017801", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017801" }, { "name": "23091", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23091" }, { "name": "ADV-2007-1076", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1076" }, { "name": "MDKSA-2007:072", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:072" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1564", "datePublished": "2007-03-21T19:00:00", "dateReserved": "2007-03-21T00:00:00", "dateUpdated": "2024-08-07T12:59:08.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0866 (GCVE-0-2004-0866)
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "name": "1011332", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011332" }, { "name": "web-browser-session-hijack(17415)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "name": "11186", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "name": "1011332", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011332" }, { "name": "web-browser-session-hijack(17415)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "name": "11186", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109536612321898\u0026w=2" }, { "name": "1011332", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011332" }, { "name": "web-browser-session-hijack(17415)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17415" }, { "name": "11186", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11186" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0866", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2004-09-14T00:00:00", "dateUpdated": "2024-08-08T00:31:47.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4229 (GCVE-0-2007-4229)
Vulnerability from cvelistv5
Published
2007-08-08 22:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in KDE Konqueror 3.5.7 and earlier allows remote attackers to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET, and A tags. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html" }, { "name": "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded" }, { "name": "25170", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25170" }, { "name": "42552", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/42552" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in KDE Konqueror 3.5.7 and earlier allows remote attackers to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET, and A tags. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html" }, { "name": "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded" }, { "name": "25170", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25170" }, { "name": "42552", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/42552" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4229", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in KDE Konqueror 3.5.7 and earlier allows remote attackers to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET, and A tags. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html", "refsource": "MISC", "url": "http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html" }, { "name": "20070801 [BuHa-Security] DoS Vulnerability in Konqueror 3.5.7", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/475266/100/0/threaded" }, { "name": "25170", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25170" }, { "name": "42552", "refsource": "OSVDB", "url": "http://osvdb.org/42552" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4229", "datePublished": "2007-08-08T22:00:00", "dateReserved": "2007-08-08T00:00:00", "dateUpdated": "2024-08-07T14:46:39.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-4382 (GCVE-0-2008-4382)
Vulnerability from cvelistv5
Published
2008-10-02 18:00
Modified
2024-08-07 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:08.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080930 Re: MS Internet Explorer 7 Denial Of Service Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496849/100/0/threaded" }, { "name": "konqueror-alert-function-dos(45645)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45645" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080930 Re: MS Internet Explorer 7 Denial Of Service Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496849/100/0/threaded" }, { "name": "konqueror-alert-function-dos(45645)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45645" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror in KDE 3.5.9 allows remote attackers to cause a denial of service (application crash) via Javascript that calls the alert function with a URL-encoded string of a large number of invalid characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080930 Re: MS Internet Explorer 7 Denial Of Service Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496849/100/0/threaded" }, { "name": "konqueror-alert-function-dos(45645)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45645" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4382", "datePublished": "2008-10-02T18:00:00", "dateReserved": "2008-10-02T00:00:00", "dateUpdated": "2024-08-07T10:17:08.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2164 (GCVE-0-2007-2164)
Vulnerability from cvelistv5
Published
2007-04-22 19:00
Modified
2024-08-07 13:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Konqueror 3.5.5 release 45.4 allows remote attackers to cause a denial of service (browser crash or abort) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:23:50.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070417 Re: Internet Explorer Crash", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466147/100/0/threaded" }, { "name": "2600", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2600" }, { "name": "20070417 Internet Explorer Crash", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/466017/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Konqueror 3.5.5 release 45.4 allows remote attackers to cause a denial of service (browser crash or abort) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070417 Re: Internet Explorer Crash", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466147/100/0/threaded" }, { "name": "2600", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2600" }, { "name": "20070417 Internet Explorer Crash", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/466017/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Konqueror 3.5.5 release 45.4 allows remote attackers to cause a denial of service (browser crash or abort) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070417 Re: Internet Explorer Crash", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466147/100/0/threaded" }, { "name": "2600", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2600" }, { "name": "20070417 Internet Explorer Crash", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/466017/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2164", "datePublished": "2007-04-22T19:00:00", "dateReserved": "2007-04-22T00:00:00", "dateUpdated": "2024-08-07T13:23:50.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }