Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0070
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows User Shell远程缓冲区溢出漏洞(MS02-014)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Shell是美国微软(Microsoft)公司的一个Windows系统下与用户交互的界面,它允许用户执行公共的任务,如访问文件系统、导出执行程序和改变系统设置等。 Windows Shell实现上存在缓冲区溢出漏洞,在特定的情况下,远程攻击者可以利用此漏洞在用户机器上执行任意指令。 当查找那些因为已经被删除的或者不正确地被卸载的程序时,Windows Shell用于定位"丢失"文件的组件存在缓冲区溢出问题。如果一个用来处理URL的程序被不正确地卸载,那么当某个来源如电子
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0070
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0070
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-0070

No comments yet


Leave a comment