Loading
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
Cite this page
CVE-2021-3331. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2021-3331
Use Winscp vendor hub and Winscp product page to widen CVE-2021-3331 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-28864, CVE-2007-4909 and CVE-2018-20684 for nearby disclosures in the same product family.