9.3

CVE-2007-3896

The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.

Data is provided by the National Vulnerability Database (NVD)
MicrosoftInternet Explorer Version7.0
   MicrosoftWindows 2003 Server Editionitanium
   MicrosoftWindows 2003 Server Editionx64
   MicrosoftWindows 2003 Server Updatesp1
   MicrosoftWindows 2003 Server Updatesp2
   MicrosoftWindows 2003 Server Updatesp2 Editionitanium
   MicrosoftWindows 2003 Server Updatesp2 Editionx64
   MicrosoftWindows Xp Editionx64
   MicrosoftWindows Xp Updatesp2
   MicrosoftWindows Xp Updatesp2 Editionx64
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 82% 0.992
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.