Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-57m8-3xxg-m3v2

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.

Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.

EPSS

Процентиль: 65%
0.00489
Низкий

Связанные уязвимости

nvd
около 23 лет назад

Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.

EPSS

Процентиль: 65%
0.00489
Низкий