Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-244f-56x7-fc34

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions."

The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions."

EPSS

Процентиль: 95%
0.21158
Средний

Связанные уязвимости

nvd
около 18 лет назад

The CallCode ActiveX control in caller.dll 3.0 before 20070713, and 3.0 SP1 before 3.0.5.81, in CA (formerly Computer Associates) eTrust Intrusion Detection allows remote attackers to load arbitrary DLLs on a client system, and execute code from these DLLs, via unspecified "scriptable functions."

EPSS

Процентиль: 95%
0.21158
Средний