Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m3qj-gw3q-pq38

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the RunCmd method in the SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to execute arbitrary code via vectors involving "CreateProcess params." NOTE: some of these details are obtained from third party information.

Buffer overflow in the RunCmd method in the SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to execute arbitrary code via vectors involving "CreateProcess params." NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 96%
0.22785
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 15 лет назад

Buffer overflow in the RunCmd method in the SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to execute arbitrary code via vectors involving "CreateProcess params." NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 96%
0.22785
Средний

Дефекты

CWE-119