{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T18:16:25.353","vulnerabilities":[{"cve":{"id":"CVE-2017-8387","sourceIdentifier":"cve@mitre.org","published":"2017-07-05T20:29:02.950","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"STDU Viewer version 1.6.375 might allow user-assisted attackers to execute code via a crafted file. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands including Ctrl-+ commands."},{"lang":"es","value":"STDU Viewer en su versión 1.6.375 podría permitir que atacantes ayudados por un usuario ejecuten código mediante un archivo manipulado. Un modelo de amenaza es una víctima que obtiene un archivo manipulado no fiable de una localización remota y envía varios comandos definidos por el usuario, incluyendo comandos Ctrl-+."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*","matchCriteriaId":"9E841F3F-38C6-4A73-887F-7A77251C4A4E"}]}]}],"references":[{"url":"https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8387","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8387","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}