Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xr3p-ggh8-8r4x

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

OpenText FirstClass 8.0 client does not properly sanitize strings before passing them to the Windows ShellExecute API, which allows remote attackers to execute arbitrary commands via a UNC path in a bookmark.

OpenText FirstClass 8.0 client does not properly sanitize strings before passing them to the Windows ShellExecute API, which allows remote attackers to execute arbitrary commands via a UNC path in a bookmark.

EPSS

Процентиль: 77%
0.01079
Низкий

Связанные уязвимости

nvd
почти 21 год назад

OpenText FirstClass 8.0 client does not properly sanitize strings before passing them to the Windows ShellExecute API, which allows remote attackers to execute arbitrary commands via a UNC path in a bookmark.

EPSS

Процентиль: 77%
0.01079
Низкий