Show plain JSON{"id": "CVE-2014-8600", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-12-08T11:59:09.233", "references": [{"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html", "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2014/Nov/54", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://ubuntu.com/usn/usn-2414-1", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/71190", "source": "cve@mitre.org"}, {"url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8600/", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2014/Nov/54", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://ubuntu.com/usn/usn-2414-1", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/71190", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8600/", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en KDE-Runtime 4.14.3 y anteriores, kwebkitpart 1.3.4 y anteriores, y kio-extras 5.1.1 y anteriores permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URI maniplada que utiliza la esquema (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar, lo que no se maneja correctamente en un mensaje de error."}], "lastModified": "2024-11-21T02:19:25.093", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:urs_wolfer:kwebkitpart:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0815A99-69E1-4DCD-802A-255B9F4954E4", "versionEndIncluding": "1.3.3"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:kde:kde-runtime:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "777F4333-4C87-43EB-AB10-23BE808FA85A", "versionEndIncluding": "4.14.2"}, {"criteria": "cpe:2.3:a:kde:kio-extras:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01B71A88-8438-449E-AE3E-72ACCB6E4337", "versionEndIncluding": "5.1.1"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}