Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vp93-v8xp-q5r9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.

Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.

EPSS

Процентиль: 98%
0.58302
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
почти 15 лет назад

Stack-based buffer overflow in WTclient.dll in SCADA Engine BACnet OPC Client before 1.0.25 allows user-assisted remote attackers to execute arbitrary code via a crafted .csv file, related to a status log message.

EPSS

Процентиль: 98%
0.58302
Средний

Дефекты

CWE-119