Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-031
No PoCs found on GitHub currently.