Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gjj7-8chj-25qp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SaveMessage method in the LEADeMail.LEADSmtp.20 ActiveX control in LTCML14n.dll 14.0.0.34 in Kofax e-Transactions Sender Sendbox 2.5.0.933 allows remote attackers to write to arbitrary files via a pathname in the first argument.

The SaveMessage method in the LEADeMail.LEADSmtp.20 ActiveX control in LTCML14n.dll 14.0.0.34 in Kofax e-Transactions Sender Sendbox 2.5.0.933 allows remote attackers to write to arbitrary files via a pathname in the first argument.

EPSS

Процентиль: 64%
0.00467
Низкий

Связанные уязвимости

nvd
около 11 лет назад

The SaveMessage method in the LEADeMail.LEADSmtp.20 ActiveX control in LTCML14n.dll 14.0.0.34 in Kofax e-Transactions Sender Sendbox 2.5.0.933 allows remote attackers to write to arbitrary files via a pathname in the first argument.

EPSS

Процентиль: 64%
0.00467
Низкий