Логотип exploitDog
bind:CVE-2019-15701
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-15701

Количество 2

Количество 2

nvd логотип

CVE-2019-15701

почти 6 лет назад

components/Modals/HelpModal.jsx in BloodHound 2.2.0 allows remote attackers to execute arbitrary OS commands (by spawning a child process as the current user on the victim's machine) when the search function's autocomplete feature is used. The victim must import data from an Active Directory with a GPO containing JavaScript in its name.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-229q-863f-g82c

около 3 лет назад

components/Modals/HelpModal.jsx in BloodHound 2.2.0 allows remote attackers to execute arbitrary OS commands (by spawning a child process as the current user on the victim's machine) when the search function's autocomplete feature is used. The victim must import data from an Active Directory with a GPO containing JavaScript in its name.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-15701

components/Modals/HelpModal.jsx in BloodHound 2.2.0 allows remote attackers to execute arbitrary OS commands (by spawning a child process as the current user on the victim's machine) when the search function's autocomplete feature is used. The victim must import data from an Active Directory with a GPO containing JavaScript in its name.

CVSS3: 8.8
1%
Низкий
почти 6 лет назад
github логотип
GHSA-229q-863f-g82c

components/Modals/HelpModal.jsx in BloodHound 2.2.0 allows remote attackers to execute arbitrary OS commands (by spawning a child process as the current user on the victim's machine) when the search function's autocomplete feature is used. The victim must import data from an Active Directory with a GPO containing JavaScript in its name.

CVSS3: 8.8
1%
Низкий
около 3 лет назад

Уязвимостей на страницу