CVE-2014-8600
Summary
| CVE | CVE-2014-8600 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-12-08 11:59:09 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Kde | Kde-runtime | All | All | All | All |
| Application | Kde | Kio-extras | All | All | All | All |
| Operating System | Opensuse | Opensuse | 13.1 | All | All | All |
| Application | Urs Wolfer | Kwebkitpart | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Multiple KDE Products CVE-2014-8600 Multiple Security Bypass Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| openSUSE-SU-2015:0573-1: moderate: Security update for kdebase4-runtime, | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Full Disclosure: CVE-2014-8600 - Insufficient Input Validation By IO Slaves In KDE e.V. KDE | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit |
| USN-2414-1: KDE-Runtime vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | ubuntu.com | Patch, Vendor Advisory |
| cve-2014-8600 - Portcullis | af854a3a-2127-422b-91ae-364da2661108 | www.portcullis-security.com | Exploit |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.