Explorer32++ 1.3.5.531 contains a buffer overflow vulnerability in Structured Exception Handler (SEH) records that allows attackers to execute arbitrary code. Attackers can exploit the vulnerability by providing a long file name argument over 396 characters to corrupt the SEH chain and potentially execute malicious code.
References
| Link | Resource |
|---|---|
| https://web.archive.org/web/20230205040401/http://www.explorerplusplus.com/ | Product |
| https://www.exploit-db.com/exploits/51077 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/explorer-buffer-overflow | Third Party Advisory |
| https://www.exploit-db.com/exploits/51077 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:16
Updated : 2026-01-30 15:51
NVD link : CVE-2023-54334
Mitre link : CVE-2023-54334
CVE.ORG link : CVE-2023-54334
JSON object : View
Products Affected
explorerplusplus
- explorer\+\+
