Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qww4-6xrg-jp26

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'.

A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'.

EPSS

Процентиль: 97%
0.35463
Средний

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'.

CVSS3: 7.8
msrc
почти 5 лет назад

Windows Address Book Remote Code Execution Vulnerability

CVSS3: 7.8
fstec
почти 5 лет назад

Уязвимость компонента Windows Address Book операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.35463
Средний