Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qmqj-g5h9-gf39

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in Windows Live Messenger 8.0 allows user-assisted attackers to execute arbitrary code via a crafted Contact List (.ctt) file, which triggers the overflow when it is imported by the user.

Heap-based buffer overflow in Windows Live Messenger 8.0 allows user-assisted attackers to execute arbitrary code via a crafted Contact List (.ctt) file, which triggers the overflow when it is imported by the user.

EPSS

Процентиль: 95%
0.1986
Средний

Связанные уязвимости

nvd
больше 19 лет назад

Heap-based buffer overflow in Windows Live Messenger 8.0 allows user-assisted attackers to execute arbitrary code via a crafted Contact List (.ctt) file, which triggers the overflow when it is imported by the user.

EPSS

Процентиль: 95%
0.1986
Средний