Логотип exploitDog
bind:CVE-2021-1526
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-1526

Количество 3

Количество 3

nvd логотип

CVE-2021-1526

больше 4 лет назад

A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. This vulnerability is due to insufficient validation of values in Webex recording files that are in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-773x-2cfp-99mc

больше 3 лет назад

A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. This vulnerability is due to insufficient validation of values in Webex recording files that are in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

EPSS: Низкий
fstec логотип

BDU:2021-05874

больше 4 лет назад

Уязвимость проигрывателя Cisco Webex Player для операционных систем Windows и MacOS, связанная с недостаточной проверкой значений в файлах записи Webex, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-1526

A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. This vulnerability is due to insufficient validation of values in Webex recording files that are in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-773x-2cfp-99mc

A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on an affected system. This vulnerability is due to insufficient validation of values in Webex recording files that are in Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05874

Уязвимость проигрывателя Cisco Webex Player для операционных систем Windows и MacOS, связанная с недостаточной проверкой значений в файлах записи Webex, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу