windows-seleniumjar-mirror downloads the Selenium Jar file windows-seleniumjar-mirror downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
References
Link | Resource |
---|---|
https://nodesecurity.io/advisories/281 | Third Party Advisory |
https://nodesecurity.io/advisories/281 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://nodesecurity.io/advisories/281 - Third Party Advisory |
Information
Published : 2018-06-04 16:29
Updated : 2024-11-21 02:44
NVD link : CVE-2016-10670
Mitre link : CVE-2016-10670
CVE.ORG link : CVE-2016-10670
JSON object : View
Products Affected
windows-seleniumjar-mirror_project
- windows-seleniumjar-mirror