Description
Help Center (HelpCtr.exe) may allow remote attackers to read or execute arbitrary files via an "http://" or "file://" argument to the topic parameter in an hcp:// URL. NOTE: since the initial report of this problem, several researchers have been unable to reproduce this issue.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Bartosz Kwitkowski · textremotewindows
https://www.exploit-db.com/exploits/23675
References (7)
Core 7
Core References
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0688.html
Exploit mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/353248
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9621
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15101
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0450.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107652584102003&w=2
Exploit, Vendor Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0440.html
Scores
EPSS
0.2240
EPSS Percentile
95.9%
Details
Status
published
Products (1)
microsoft/windows_xp
(3 CPE variants)
Published
Jul 07, 2004
Tracked Since
Feb 18, 2026