Page 3 of 17 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 15EXPL: 0

Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses. Múltiples vulnerabilidades en KDE 2 y KDE 3.x a 3.0.5 no ponen entre comillas ciertos parámetros que son insertados en comando de shell, lo que podría permitir a atacantes remotos ejecutar comandos arbitrarios mediante URLs, nombres de ficheros o direcciones de correo electrónico. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000569 http://marc.info/?l=bugtraq&m=104049734911544&w=2 http://marc.info/?l=bugtraq&m=104066520330397&w=2 http://secunia.com/advisories/8067 http://secunia.com/advisories/8103 http://www.debian.org/security/2003/dsa-234 http://www.debian.org/security/2003/dsa-235 http://www.debian.org/security/2003/dsa-236 http://www.debian.org/security/2003/dsa-237 http://www.debian.org/security/2003/dsa-238 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in konqueror in KDE 2.1 through 3.0 and 3.0.2 allows remote attackers to cause a denial of service (crash) via an IMG tag with large width and height attributes. • http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-09/0167.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-09/0177.html http://www.iss.net/security_center/static/10126.php http://www.securityfocus.com/bid/5721 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 9%CPEs: 10EXPL: 0

Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x before 3.0.4, allow (1) local and possibly remote attackers to execute arbitrary code via the "lisa" daemon, and (2) remote attackers to execute arbitrary code via a certain "lan://" URL. Múltiples desbordamientos de búfer en LISa en KDE 2.x a partir de 2.1, y KDE 3.x anteriores a 3.0.4 permiten a atacantes locales y posiblemente remotos ejecutar código mediante el demonio "lisa", y a atacantes remotos ejecutar código arbitrario mediante una cierta URL de tipo "lan://" • http://marc.info/?l=bugtraq&m=103712329102632&w=2 http://marc.info/?l=bugtraq&m=103728981029342&w=2 http://www.ciac.org/ciac/bulletins/n-020.shtml http://www.debian.org/security/2002/dsa-214 http://www.iss.net/security_center/static/10597.php http://www.iss.net/security_center/static/10598.php http://www.kde.org/info/security/advisory-20021111-2.txt http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-080.php http://www.novell.com/linux/security/ •

CVSS: 7.5EPSS: 9%CPEs: 11EXPL: 0

Unknown vulnerability in the telnet KIO subsystem (telnet.protocol) of KDE 2.x 2.1 and later allows local and remote attackers to execute arbitrary code via a certain URL. Vulnerabilidad desconocida en el subsistema KIO de telnet (telnet.protocol) de KDE 2.X 2.1 y posteriores permite a atacantes remotos ejecutar código arbitrario mediante una cierta URL. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-012.0.txt http://marc.info/?l=bugtraq&m=103712550205730&w=2 http://marc.info/?l=bugtraq&m=103728981029342&w=2 http://secunia.com/advisories/8298 http://www.debian.org/security/2002/dsa-204 http://www.iss.net/security_center/static/10603.php http://www.kde.org/info/security/advisory-20021111-1.txt http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-079.php http://www.redhat.com/support/errata/RH •

CVSS: 7.5EPSS: 9%CPEs: 11EXPL: 0

Unknown vulnerability in the rlogin KIO subsystem (rlogin.protocol) of KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and earlier, allows local and remote attackers to execute arbitrary code via a certain URL. Vulnerabilidad desconocida en el subsistema KIO (rlogin.protocol) de KDE 2.x 2.1 y posteriores, y KDE 3.x 3.0.4 y posteriores, permite a atacantes locales y remotos ejecutar código arbitrario mediante cierta URL. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-012.0.txt http://marc.info/?l=bugtraq&m=103712550205730&w=2 http://marc.info/?l=bugtraq&m=103728981029342&w=2 http://secunia.com/advisories/8298 http://www.debian.org/security/2002/dsa-204 http://www.iss.net/security_center/static/10602.php http://www.kde.org/info/security/advisory-20021111-1.txt http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-079.php http://www.redhat.com/support/errata/RH •