1 results (0.002 seconds)

CVSS: 9.3EPSS: 88%CPEs: 4EXPL: 4

Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method. Worldweaver DX Studio Player v3.0.29.0, v3.0.22.0, v3.0.12.0, y probablemente otras versiones anteriores a la v3.0.29.1, cuando es utilizado como plug-in de Firefox, no restringe el acceso al metodo shell.execute JavaScript API, lo que permite a atacantes remotos ejecutar comandos arbitrarios a través de el fichero .dxstudio que invoca este método. • https://www.exploit-db.com/exploits/16515 https://www.exploit-db.com/exploits/8922 http://secunia.com/advisories/35402 http://www.coresecurity.com/content/DXStudio-player-firefox-plugin http://www.dxstudio.com/forumtopic.aspx?topicid=b4152459-fb5f-4933-b700-b3fbd54f6bfd http://www.securityfocus.com/archive/1/504195/100/0/threaded http://www.securityfocus.com/bid/35273 http://www.vupen.com/english/advisories/2009/1561 https://exchange.xforce.ibmcloud.com/vulnerabilities/51035 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •