Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-1511

Опубликовано: 17 мая 2010
Источник: debian
EPSS Низкий

Описание

KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kdenetworkfixed4:4.4.4-1package
kdenetworknot-affectedlennypackage

Примечания

  • http://seclists.org/fulldisclosure/2010/May/164

EPSS

Процентиль: 91%
0.06639
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.

redhat
больше 15 лет назад

KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.

nvd
больше 15 лет назад

KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.

github
больше 3 лет назад

KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file.

EPSS

Процентиль: 91%
0.06639
Низкий