{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:31:07.470","vulnerabilities":[{"cve":{"id":"CVE-2016-4294","sourceIdentifier":"cret@cert.org","published":"2017-01-06T21:59:01.257","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"When opening a Hangul Hcell Document (.cell) and processing a property record within the Workbook stream, Hancom Office 2014 will attempt to allocate space for an element using a length from the file. When copying user-supplied data to this buffer, however, the application will use a different size which leads to a heap-based buffer overflow. This vulnerability can lead to code-execution under the context of the application."},{"lang":"es","value":"Cuando se abre un Hangul Hcell Document (.cell) y se procesa un registro de propiedad dentro del Workbook stream, Hancom Office 2014 tratará de asignar espacio para un elemento utilizando una longitud del archivo. Cuando se copien datos proporcionados por el usuario a este búfer, sin embargo, la aplicación utilizará un tamaño diferente que lleva a un desbordamiento de búfer basado en memoria dinámica. Esta vulnerabilidad puede conducir a una ejecución de código bajo el contexto de la aplicación."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*","versionEndIncluding":"9.1.0.2176","matchCriteriaId":"C0371DC9-A86B-4729-B74C-7C0AA87A54BB"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/92327","source":"cret@cert.org"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0149/","source":"cret@cert.org","tags":["Exploit","Technical Description","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/92327","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0149/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory","VDB Entry"]}]}}]}