Описание
Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI.
Ссылки
- Vendor Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:freenetproject:freenet:0.7.5:1472:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1473:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1475:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1476:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1477:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1479:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1480:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1483:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.16422
Средний
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-19
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI.
EPSS
Процентиль: 95%
0.16422
Средний
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-19