Yes24ViewerX ActiveX Control up to 1.0.327.50126 Argument Remote Code Execution
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
6.3 | $0-$5k |
A vulnerability was found in Yes24ViewerX ActiveX Control up to 1.0.327.50126. It has been rated as critical. This issue affects some unknown processing. The manipulation as part of a Argument leads to a privilege escalation vulnerability (Code Execution). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.
The weakness was released 08/15/2019. The identification of this vulnerability is CVE-2019-12809 since 06/13/2019. The attack may be initiated remotely. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/16/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Vendor
Name
VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.3
VulDB Base Score: ≈6.3
VulDB Temp Score: ≈6.3
VulDB Vector: 🔒
VulDB Reliability: 🔍
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation / Code Execution (CWE-269)
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒0-Day unlock unlock unlock unlock Today unlock unlock unlock unlock
Threat Intelligence
Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known
0-Day Time: 🔒
06/13/2019 CVE assigned Upgrade your account now!
08/15/2019 Advisory disclosed
08/16/2019 VulDB entry created
08/16/2019 VulDB last update
CVE: CVE-2019-12809 (🔒)Created: 08/16/2019 07:11 AM
Complete: 🔍
https://vuldb.com/?id.140111
Comments