mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
19 lines
776 B
Markdown
19 lines
776 B
Markdown
### [CVE-2021-3331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3331)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/Ogunslove/WinSCP-Vulnerability-Analysis
|
|
- https://github.com/Ross46/Follina
|
|
|