Microsoft Windows .contact Arbitrary...

- AV AC AU C I A
发布: 2019-01-16
修订: 2025-04-13

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to the processing of ".contact" files <c:Url> node param which takes an expected website value, however if an attacker references an executable file it will run that instead without warning instead of performing expected web navigation. This is dangerous and would be unexpected to an end user.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息