Products
Microsoft Outlook
Source
secure@microsoft.com
Tags
CVE-2024-38173 details
Published : Aug. 13, 2024, 6:15 p.m.
Last Modified : Aug. 13, 2024, 6:15 p.m.
Last Modified : Aug. 13, 2024, 6:15 p.m.
Description
Microsoft Outlook Remote Code Execution Vulnerability
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.7 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-73 | External Control of File Name or Path | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
6.7
Exploitability Score
0.8
Impact Score
5.9
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38173 | secure@microsoft.com |
This website uses the NVD API, but is not approved or certified by it.