CVE-2019-9673

Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freenetproject:freenet:0.7.5:1472:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1473:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1475:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1476:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1477:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1479:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1480:*:*:*:*:*:*
cpe:2.3:a:freenetproject:freenet:0.7.5:1483:*:*:*:*:*:*

History

21 Nov 2024, 04:52

Type Values Removed Values Added
References () https://freenetproject.org - Vendor Advisory () https://freenetproject.org - Vendor Advisory
References () https://freenetproject.org/freenet-build-1484-released.html - Vendor Advisory () https://freenetproject.org/freenet-build-1484-released.html - Vendor Advisory
References () https://github.com/mgrube/CVE-2019-9673 - Exploit, Third Party Advisory () https://github.com/mgrube/CVE-2019-9673 - Exploit, Third Party Advisory

Information

Published : 2019-06-05 16:29

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9673

Mitre link : CVE-2019-9673

CVE.ORG link : CVE-2019-9673


JSON object : View

Products Affected

freenetproject

  • freenet
CWE
CWE-19

Data Processing Errors