It has been reported that FirstClass may be prone to a vulnerability that may allow an attacker to execute arbitrary applications on a vulnerable system. This issue may be exploited by placing special characters such as <>\/?*" at the end of the file extension. Due to improper sanitization of user-supplied file names, malicious files with specially crafted names may be executed without a warning prompt being displayed. FirstClass version 7.1 has been reported to be prone to this issue.
It has been reported that FirstClass may be prone to a vulnerability that may allow an attacker to execute arbitrary applications on a vulnerable system. This issue may be exploited by placing special characters such as <>\/?*" at the end of the file extension. Due to improper sanitization of user-supplied file names, malicious files with specially crafted names may be executed without a warning prompt being displayed. FirstClass version 7.1 has been reported to be prone to this issue.