Логотип exploitDog
bind:CVE-2019-11354
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11354

Количество 2

Количество 2

nvd логотип

CVE-2019-11354

почти 7 лет назад

The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.

CVSS3: 7.8
EPSS: Средний
github логотип

GHSA-hx6h-52mp-q9jp

больше 3 лет назад

The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.

CVSS3: 7.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-11354

The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.

CVSS3: 7.8
47%
Средний
почти 7 лет назад
github логотип
GHSA-hx6h-52mp-q9jp

The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.

CVSS3: 7.8
47%
Средний
больше 3 лет назад

Уязвимостей на страницу