Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6gjh-h486-gr33

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Double free vulnerability in Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to execute arbitrary code via JavaScript that sets the Server property to a string, then sets the string to null.

Double free vulnerability in Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to execute arbitrary code via JavaScript that sets the Server property to a string, then sets the string to null.

EPSS

Процентиль: 85%
0.02564
Низкий

Связанные уязвимости

nvd
почти 18 лет назад

Double free vulnerability in Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to execute arbitrary code via JavaScript that sets the Server property to a string, then sets the string to null.

EPSS

Процентиль: 85%
0.02564
Низкий