CVE: CVE-2006-4692

Export to Word

Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."

Threat-Mapped Scoring

Score: 0.0

Priority: Unclassified

EPSS

Score: 0.63983
Percentile: 0.98319

CVSS Scoring

CVSS v2 Score: 5.1

Severity:

Mapped CWE(s)

All CAPEC(s)

CAPEC(s) with Mapped TTPs

Mapped ATT&CK TTPs

Affected Products

← Back to Home