Added |
CPE Configuration |
|
OR
*cpe:2.3:a:selenium:selenium_grid:*:*:*:*:*:*:*:* versions up to (excluding) 4.0.0
*cpe:2.3:a:selenium:selenium_grid:4.0.0:-:*:*:*:*:*:*
*cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha1:*:*:*:*:*:*
*cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha2:*:*:*:*:*:*
*cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha3:*:*:*:*:*:*
*cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha4:*:*:*:*:*:*
*cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha5:*:*:*:*:*:*
*cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha6:*:*:*:*:*:*
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C)
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
NIST CWE-352
|
Changed |
Reference Type |
https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ No Types Assigned
|
https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/ Exploit, Third Party Advisory
|
Changed |
Reference Type |
https://www.openwall.com/lists/oss-security/2022/02/07/3 No Types Assigned
|
https://www.openwall.com/lists/oss-security/2022/02/07/3 Mailing List, Not Applicable, Third Party Advisory
|
Changed |
Reference Type |
https://www.selenium.dev/downloads/ No Types Assigned
|
https://www.selenium.dev/downloads/ Product, Vendor Advisory
|