Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jp67-x46v-m6mw

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.

Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.

EPSS

Процентиль: 97%
0.3469
Средний

Связанные уязвимости

nvd
больше 20 лет назад

Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.

EPSS

Процентиль: 97%
0.3469
Средний