| ID |
CVE-2021-3331
|
| Sažetak |
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.) |
| Reference |
|
| CVSS |
| Base: | 10.0 |
| Impact: | 10.0 |
| Exploitability: | 10.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
04-02-2021 - 15:59 |
| Objavljeno |
27-01-2021 - 21:15 |