CVE-2007-4891
Published Sep 14, 2007
Last updated 7 years ago
Overview
- Description
- A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:visual_studio:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5CDA0E2-DFBD-4EE0-80DC-76AA55ADFEFC" }, { "criteria": "cpe:2.3:a:microsoft:visual_studio:6.0.0.9782:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1DF3FDC-7E70-4385-9DAF-539FAAE77C5B" } ], "operator": "OR" } ] } ]