Vulnerability Details : CVE-2007-6255
Buffer overflow in the Microsoft HeartbeatCtl ActiveX control in HRTBEAT.OCX allows remote attackers to execute arbitrary code via the Host argument to an unspecified method.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2007-6255
Probability of exploitation activity in the next 30 days: 28.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-6255
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-6255
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-6255
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41940
Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/28882
Third Party Advisory;VDB Entry
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-069
-
http://www.kb.cert.org/vuls/id/570089
Third Party Advisory;US Government Resource
Products affected by CVE-2007-6255
- cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:*:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:*:professional:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*