Microsoft Office OneNote Remote Code Execution Vulnerability
Weakness
The product constructs the name of a file or other resource using input from an upstream component, but it does not restrict or incorrectly restricts the resulting name.
Potential Mitigations
References