| Título | AutohomeCorp frostmourne <=1.0 remote code execution |
|---|
| Descrição | A critical remote code execution vulnerability exists in Frostmourne's alarm expression evaluation system. Authenticated administrative users can inject arbitrary JavaScript code via the alarm configuration interface, which is then executed by the Nashorn script engine without validation, leading to complete server compromise.
|
|---|
| Fonte | ⚠️ https://github.com/AnalogyC0de/public_exp/issues/17 |
|---|
| Utilizador | Ana10gy (UID 93358) |
|---|
| Submissão | 27/02/2026 08h13 (há 1 mês) |
|---|
| Moderação | 11/03/2026 14h39 (12 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 350397 [AutohomeCorp frostmourne até 1.0 Oracle Nashorn JavaScript Engine ExpressionRule.java scriptEngine.eval EXPRESSION Elevação de Privilégios] |
|---|
| Pontos | 18 |
|---|