Логотип exploitDog
bind:CVE-2017-8803
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-8803

Количество 2

Количество 2

nvd логотип

CVE-2017-8803

больше 8 лет назад

Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow user-assisted attackers to execute code via a crafted file, because of a "Data from Faulting Address controls Code Flow" issue. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-m789-p7c6-4q2w

больше 3 лет назад

Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow user-assisted attackers to execute code via a crafted file, because of a "Data from Faulting Address controls Code Flow" issue. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-8803

Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow user-assisted attackers to execute code via a crafted file, because of a "Data from Faulting Address controls Code Flow" issue. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands.

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
github логотип
GHSA-m789-p7c6-4q2w

Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow user-assisted attackers to execute code via a crafted file, because of a "Data from Faulting Address controls Code Flow" issue. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу