Zero-day Vulnerability Database
Zero-day vulnerabilities discovered: 1
Buffer overflow
The vulnerability allows a remote user to execute arbitrary code on the target system.
The weakness is due to stack-based buffer overflow. By persuading the victim to open a modified document, a remote attacker can execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: this vulnerability was being actively exploited.
Buffer overflow
The vulnerability allows a remote user to execute arbitrary code on the target system.
The weakness is due to stack-based buffer overflow. By persuading the victim to open a modified document, a remote attacker can execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: this vulnerability was being actively exploited.
Known/fameous malware:
Trojan.Tarodrop.