Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7v87-vx3w-pwr8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.

EPSS

Процентиль: 64%
0.00464
Низкий

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.

EPSS

Процентиль: 64%
0.00464
Низкий