Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rcr6-6gg6-97q7

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the Step-by-Step Interactive Training in Microsoft Windows 2000 SP4, XP SP2 and Professional, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a long Syllabus string in crafted bookmark link files (cbo, cbl, or .cbm), a different issue than CVE-2005-1212.

Buffer overflow in the Step-by-Step Interactive Training in Microsoft Windows 2000 SP4, XP SP2 and Professional, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a long Syllabus string in crafted bookmark link files (cbo, cbl, or .cbm), a different issue than CVE-2005-1212.

EPSS

Процентиль: 98%
0.62544
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
почти 19 лет назад

Buffer overflow in the Step-by-Step Interactive Training in Microsoft Windows 2000 SP4, XP SP2 and Professional, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a long Syllabus string in crafted bookmark link files (cbo, cbl, or .cbm), a different issue than CVE-2005-1212.

EPSS

Процентиль: 98%
0.62544
Средний

Дефекты

CWE-119