Buffer overflow vulnerability in Explorer++ affecting version 1.3.5.531. A local attacker could execute arbitrary code via a long filename argument by monitoring Structured Exception Handler (SEH) records.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-vulnerability-explorer | Third Party Advisory |
Configurations
History
24 Jan 2024, 19:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-vulnerability-explorer - Third Party Advisory | |
First Time |
Explorerplusplus explorer\+\+
Explorerplusplus |
|
CPE | cpe:2.3:a:explorerplusplus:explorer\+\+:1.3.5.531:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
17 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-17 14:15
Updated : 2024-01-24 19:24
NVD link : CVE-2024-0645
Mitre link : CVE-2024-0645
JSON object : View
Products Affected
explorerplusplus
- explorer\+\+
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')