Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r993-4vgm-6r2p

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.

The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 97%
0.35693
Средний

Связанные уязвимости

nvd
больше 13 лет назад

The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 97%
0.35693
Средний