Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rx6x-hw9j-xhm3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

EPSS

Процентиль: 91%
0.06385
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
около 5 лет назад

WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)

EPSS

Процентиль: 91%
0.06385
Низкий