2 results (0.006 seconds)

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

fishProtocol::establishConnection in fish/fish.cpp in KDE kio-extras through 20.04.0 makes a cacheAuthentication call even if the user had not set the keepPassword option. This may lead to unintended KWallet storage of a password. La función fishProtocol::establishConnection en el archivo fish/fish.cpp en KDE kio-extras versiones hasta 20.04.0, realiza una llamada de cacheAuthentication aun cuando el usuario no haya configurado la opción keepPassword. Esto puede conllevar a un almacenamiento involuntario de una contraseña en el KWallet. • https://commits.kde.org/kio-extras/d813cef3cecdec9af1532a40d677a203ff979145 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message. Múltiples vulnerabilidades de XSS en KDE-Runtime 4.14.3 y anteriores, kwebkitpart 1.3.4 y anteriores, y kio-extras 5.1.1 y anteriores permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de una URI maniplada que utiliza la esquema (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar, lo que no se maneja correctamente en un mensaje de error. It was discovered that a number of the protocol handlers (referred to as IO slaves) did not satisfactorily handle malicious input. It is possible for an attacker to inject JavaScript by manipulating IO slave URI such that the JavaScript from the manipulated request is returned in the response. • http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html http://seclists.org/fulldisclosure/2014/Nov/54 http://ubuntu.com/usn/usn-2414-1 http://www.securityfocus.com/bid/71190 https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8600 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •