Notepad++ up to 7.6 Scintilla SciLexer.dll Unicode Character Remote Code Execution – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on September 16th, 2019 📆 | 8521 Views ⚑


Notepad++ up to 7.6 Scintilla SciLexer.dll Unicode Character Remote Code Execution

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability was found in Notepad++ up to 7.6 (Document Reader Software) and classified as critical. This issue affects some unknown processing in the library SciLexer.dll of the component Scintilla. The manipulation as part of a Unicode Character leads to a privilege escalation vulnerability (Code Execution). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was released 09/14/2019. The identification of this vulnerability is CVE-2019-16294 since 09/13/2019. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit.

Upgrading to version 7.7 eliminates this vulnerability.



VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0

VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation / Code Execution (CWE-269)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Notepad++ 7.7

09/13/2019 CVE assigned
09/14/2019 +1 days Advisory disclosed
09/15/2019 +1 days VulDB entry created
09/15/2019 +0 days VulDB last update
CVE: CVE-2019-16294 (🔒)Created: 09/15/2019 08:22 AM
Complete: 🔍


No comments yet. Please log in to comment.

Check our Alexa App!

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *