Логотип exploitDog
bind:CVE-2018-18603
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-18603

Количество 2

Количество 2

nvd логотип

CVE-2018-18603

больше 7 лет назад

360 Total Security 3.5.0.1033 allows a Sandbox Escape via an "import os" statement, followed by os.system("CMD") or os.system("PowerShell"), within a .py file. NOTE: the vendor's position is that this cannot be categorized as a vulnerability, although it is a security-related issue

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-jq9r-vxcv-j9c9

больше 3 лет назад

** DISPUTED ** 360 Total Security 3.5.0.1033 allows a Sandbox Escape via an "import os" statement, followed by os.system("CMD") or os.system("PowerShell"), within a .py file. NOTE: the vendor's position is that this cannot be categorized as a vulnerability, although it is a security-related issue.

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-18603

360 Total Security 3.5.0.1033 allows a Sandbox Escape via an "import os" statement, followed by os.system("CMD") or os.system("PowerShell"), within a .py file. NOTE: the vendor's position is that this cannot be categorized as a vulnerability, although it is a security-related issue

CVSS3: 6.3
0%
Низкий
больше 7 лет назад
github логотип
GHSA-jq9r-vxcv-j9c9

** DISPUTED ** 360 Total Security 3.5.0.1033 allows a Sandbox Escape via an "import os" statement, followed by os.system("CMD") or os.system("PowerShell"), within a .py file. NOTE: the vendor's position is that this cannot be categorized as a vulnerability, although it is a security-related issue.

CVSS3: 6.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу