A vulnerability has been discovered in Winhex affecting version 16.1 SR-1 and 20.4. This vulnerability consists of a buffer overflow controlling the Structured Exception Handler (SEH) registers. This could allow attackers to execute arbitrary code via a long filename argument.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Winhex
Winhex winhex |
|
CPEs | cpe:2.3:a:winhex:winhex:*:*:*:*:*:*:*:* | |
Vendors & Products |
Winhex
Winhex winhex |
|
Metrics |
ssvc
|
Mon, 07 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been discovered in Winhex affecting version 16.1 SR-1 and 20.4. This vulnerability consists of a buffer overflow controlling the Structured Exception Handler (SEH) registers. This could allow attackers to execute arbitrary code via a long filename argument. | |
Weaknesses | CWE-119 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: INCIBE
Published: 2024-10-07T15:03:07.120Z
Updated: 2024-10-07T19:11:20.909Z
Reserved: 2023-11-28T10:40:07.954Z
Link: CVE-2023-6362
Vulnrichment
Updated: 2024-10-07T18:40:16.501Z
NVD
Status : Awaiting Analysis
Published: 2024-10-07T15:15:07.670
Modified: 2024-10-07T17:47:48.410
Link: CVE-2023-6362
Redhat
No data.