Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-57m8-3xxg-m3v2

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.

Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.

EPSS

Процентиль: 59%
0.00384
Низкий

Связанные уязвимости

nvd
почти 23 года назад

Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.

EPSS

Процентиль: 59%
0.00384
Низкий