Описание
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-1497
- https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features
- https://www.exploit-db.com/exploits/40491
- http://osvdb.org/show/osvdb/118382
- http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html
- http://www.exploit-db.com/exploits/36169
- http://www.exploit-db.com/exploits/36206
- http://www.securityfocus.com/bid/72612
- http://www.zerodayinitiative.com/advisories/ZDI-15-038
Связанные уязвимости
nvd
почти 11 лет назад
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
fstec
почти 11 лет назад
Уязвимость программы автоматизации работы пользователей Radia Client Automation, позволяющая удаленному злоумышленнику выполнить произвольные команды