1 results (0.005 seconds)

CVSS: 9.3EPSS: 94%CPEs: 13EXPL: 2

Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. Desbordamiento de búfer basado en pila en el control ActiveX de EAI WebViewer3D (webviewer3d.dll) en SAP AG SAPgui versiones anteriores a v7.10 Patch Level 9 permite a atacantes remotos ejecutar código de su elección a través de un argumento largo del método SaveViewToSessionFile. • https://www.exploit-db.com/exploits/16575 https://www.exploit-db.com/exploits/32879 http://secunia.com/advisories/34559 http://www.kb.cert.org/vuls/id/985449 http://www.securityfocus.com/bid/34310 http://www.vupen.com/english/advisories/2009/0892 https://exchange.xforce.ibmcloud.com/vulnerabilities/49543 https://service.sap.com/sap/support/notes/1153794 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •