Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h4xw-vj67-jj9f

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7

Описание

Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".

Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".

EPSS

Процентиль: 97%
0.30581
Средний

7 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7
nvd
почти 8 лет назад

Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".

CVSS3: 6.4
msrc
почти 8 лет назад

Windows Shell Remote Code Execution Vulnerability

CVSS3: 7
fstec
почти 8 лет назад

Уязвимость компонента Windows Shell операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.30581
Средний

7 High

CVSS3

Дефекты

CWE-20