Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xx58-2cm9-6rvr

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

EPSS

Процентиль: 27%
0.00094
Низкий

7.3 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.3
nvd
почти 7 лет назад

A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

CVSS3: 7.8
fstec
почти 7 лет назад

Уязвимость проигрывателей Cisco Webex Network Recording Player и Cisco Webex Player для операционных систем Windows, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 27%
0.00094
Низкий

7.3 High

CVSS3

Дефекты

CWE-787