A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.
To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.
The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.
No PoCs from references.
- https://github.com/404notf0und/CVE-Flow
- https://github.com/Cheroxx/Patch-Tuesday-Updates