Логотип exploitDog
bind:CVE-2019-17221
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17221

Количество 4

Количество 4

ubuntu логотип

CVE-2019-17221

больше 6 лет назад

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2019-17221

больше 6 лет назад

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-17221

больше 6 лет назад

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as d ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-x43g-gj9x-838x

больше 3 лет назад

PhantomJS Arbitrary File Read

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-17221

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.

CVSS3: 7.5
14%
Средний
больше 6 лет назад
nvd логотип
CVE-2019-17221

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed.

CVSS3: 7.5
14%
Средний
больше 6 лет назад
debian логотип
CVE-2019-17221

PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as d ...

CVSS3: 7.5
14%
Средний
больше 6 лет назад
github логотип
GHSA-x43g-gj9x-838x

PhantomJS Arbitrary File Read

CVSS3: 7.5
14%
Средний
больше 3 лет назад

Уязвимостей на страницу