Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jpw2-6m2h-g4hf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download and execute arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution.

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download and execute arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution.

EPSS

Процентиль: 61%
0.00409
Низкий

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download and execute arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution.

EPSS

Процентиль: 61%
0.00409
Низкий