### [CVE-2016-10320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10320) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description textract before 1.5.0 allows OS Command Injection attacks via a filename in a call to the process function. This may be a remote attack if a web application accepts names of arbitrary uploaded files. ### POC #### Reference - http://seclists.org/oss-sec/2016/q4/442 #### Github No PoCs found on GitHub currently.