Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Greenshot
Greenshot greenshot Microsoft Microsoft windows |
|
| Vendors & Products |
Greenshot
Greenshot greenshot Microsoft Microsoft windows |
Thu, 08 Jan 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311. | |
| Title | Greenshot Vulnerable to OS Command Injection via ExternalCommand Plugin | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T19:08:00.277Z
Reserved: 2026-01-05T22:30:38.719Z
Link: CVE-2026-22035
Updated: 2026-01-08T19:07:47.253Z
Status : Awaiting Analysis
Published: 2026-01-08T01:15:55.847
Modified: 2026-01-08T19:15:59.557
Link: CVE-2026-22035
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:47:39Z