Логотип exploitDog
bind:CVE-2017-5384
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-5384

Количество 5

Количество 5

ubuntu логотип

CVE-2017-5384

больше 7 лет назад

Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2017-5384

больше 7 лет назад

Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2017-5384

больше 7 лет назад

Proxy Auto-Config (PAC) files can specify a JavaScript function called ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-4f25-w4cj-3v45

больше 3 лет назад

Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0358-1

около 9 лет назад

Security update for MozillaFirefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-5384

Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
nvd логотип
CVE-2017-5384

Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
debian логотип
CVE-2017-5384

Proxy Auto-Config (PAC) files can specify a JavaScript function called ...

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
github логотип
GHSA-4f25-w4cj-3v45

Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0358-1

Security update for MozillaFirefox

около 9 лет назад

Уязвимостей на страницу