2 results (0.007 seconds)

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 0

EMC ApplicationXtender Desktop before 6.5 SP2 and ApplicationXtender Web Access .NET before 6.5 SP2 allow remote attackers to upload files to any location, and possibly execute arbitrary code, via unspecified vectors. EMC ApplicationXtender Desktop anterior a v6.5 SP2 y ApplicationXtender Web Access .NET anterior a v6.5 SP2 permite a atacantes remotos subir ficheros a cualquier localización, y posiblemente ejecutar código arbitrario, a través de vectores no especificados. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC ApplicationXtender. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WxSuperCtrl650.ocx ActiveX control. By manipulating a combination of the DisplayImageFile, AnnoLoad and AnnoSave methods, the vulnerable AnnoSave() method can enable an attacker to save arbitrary files inside arbitrary locations. • http://archives.neohapsis.com/archives/bugtraq/2012-08/0168.html http://www.securitytracker.com/id?1027442 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 95%CPEs: 12EXPL: 2

Multiple stack-based buffer overflows in the KeyHelp.KeyCtrl.1 ActiveX control in KeyHelp.ocx 1.2.312 in KeyWorks KeyHelp Module (aka the HTML Help component), as used in EMC Documentum ApplicationXtender Desktop 5.4; EMC Captiva Quickscan Pro 4.6 SP1; GE Intelligent Platforms Proficy Historian 3.1, 3.5, 4.0, and 4.5; GE Intelligent Platforms Proficy HMI/SCADA iFIX 5.0 and 5.1; GE Intelligent Platforms Proficy Pulse 1.0; GE Intelligent Platforms Proficy Batch Execution 5.6; GE Intelligent Platforms SI7 I/O Driver 7.20 through 7.42; and other products, allow remote attackers to execute arbitrary code via a long string in the second argument to the (1) JumpMappedID or (2) JumpURL method. Múltiples desbordamientos de búfer en el control ActiveX KeyHelp.KeyCtrl.1 en KeyHelp.ocx v1.2.312 en KeyWorks KeyHelp Module (también conocido como el componente HTML Help), tal como se utiliza en EMC Documentum ApplicationXtender Desktop v5.4; EMC Captiva Quickscan Pro v4.6 SP1; GE Intelligent Platforms Proficy Historian v3.1, v3.5, v4.0 y v4.5; GE Intelligent Platforms Proficy HMI/SCADA iFIX v5.0 y v5.1; Proficy Pulse v1,0; Proficy Batch Execution v5,6, SI7 ??E/S Driverv 7.20 hasta 7.42, y otros productos, permite a atacantes remotos ejecutar código de su elección a través de una larga cadena en el segundo argumento del método (1) JumpMappedID o (2) JumpURL. • http://retrogod.altervista.org/9sg_emc_keyhelp.html http://secunia.com/advisories/36905 http://secunia.com/advisories/36914 http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14863/en_US/GEIP12-04%20Security%20Advisory%20-%20Proficy%20HTML%20Help.pdf http://www.securityfocus.com/bid/36546 http://www.us-cert.gov/control_systems/pdf/ICSA-12-131-02.pdf http://www.vupen.com/english/advisories/2009/2793 http://www.vupen.com/english/advisories& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •