Описание
Microsoft WordPad Information Disclosure Vulnerability
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malicious file and convince them to open it.
What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of NTLM hashes.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
Yes
Exploited
Yes
Latest Software Release
Exploitation Detected
DOS
N/A
EPSS
Процентиль: 72%
0.00725
Низкий
6.5 Medium
CVSS3
Связанные уязвимости
CVSS3: 6.5
github
почти 2 года назад
Microsoft WordPad Information Disclosure Vulnerability
CVSS3: 6.5
fstec
почти 2 года назад
Уязвимость текстового редактора WordPad операционной системы Windows, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
Процентиль: 72%
0.00725
Низкий
6.5 Medium
CVSS3