Логотип exploitDog
bind:CVE-2025-9491
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-9491

Количество 3

Количество 3

nvd логотип

CVE-2025-9491

6 месяцев назад

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-6rf6-f9qg-8v94

6 месяцев назад

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2025-13635

3 месяца назад

Уязвимость обработчика LNK-файлов операционных систем Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-9491

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

CVSS3: 7.8
0%
Низкий
6 месяцев назад
github логотип
GHSA-6rf6-f9qg-8v94

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

CVSS3: 7
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-13635

Уязвимость обработчика LNK-файлов операционных систем Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
0%
Низкий
3 месяца назад

Уязвимостей на страницу