Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qj5f-m5rp-v884

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the WebClient ActiveX control in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP1), 7.5.217 (aka 7.5 SP2), and 8.0.2.54 allows remote attackers to execute arbitrary code via a long string in a parameter associated with the location URL.

Buffer overflow in the WebClient ActiveX control in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP1), 7.5.217 (aka 7.5 SP2), and 8.0.2.54 allows remote attackers to execute arbitrary code via a long string in a parameter associated with the location URL.

EPSS

Процентиль: 91%
0.0703
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
около 14 лет назад

Buffer overflow in the WebClient ActiveX control in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP1), 7.5.217 (aka 7.5 SP2), and 8.0.2.54 allows remote attackers to execute arbitrary code via a long string in a parameter associated with the location URL.

EPSS

Процентиль: 91%
0.0703
Низкий

Дефекты

CWE-119