Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gc5p-9g3q-56p6

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Direct2D implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a large 2D geometric figure that is encountered with Internet Explorer, aka "Microsoft Graphics Component Memory Corruption Vulnerability."

The Direct2D implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a large 2D geometric figure that is encountered with Internet Explorer, aka "Microsoft Graphics Component Memory Corruption Vulnerability."

EPSS

Процентиль: 98%
0.4649
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 11 лет назад

The Direct2D implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a large 2D geometric figure that is encountered with Internet Explorer, aka "Microsoft Graphics Component Memory Corruption Vulnerability."

fstec
больше 11 лет назад

Уязвимость операционной системы Windows, позволяющая злоумышленнику выполнить произвольный код

EPSS

Процентиль: 98%
0.4649
Средний

Дефекты

CWE-119