Published on August 17th, 2019 📆 | 6611 Views ⚑0
Yes24ViewerX ActiveX Control up to 1.0.327.50126 Argument Remote Code Execution
|CVSS Meta Temp Score||Current Exploit Price (≈)|
A vulnerability was found in Yes24ViewerX ActiveX Control up to 1.0.327.50126. It has been rated as critical. This issue affects some unknown processing. The manipulation as part of a Argument leads to a privilege escalation vulnerability (Code Execution). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.
The weakness was released 08/15/2019. The identification of this vulnerability is CVE-2019-12809 since 06/13/2019. The attack may be initiated remotely. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/16/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.3
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day unlock unlock unlock unlock Today unlock unlock unlock unlock
0-Day Time: 🔒
06/13/2019 CVE assigned Upgrade your account now!
08/15/2019 +63 days Advisory disclosed
08/16/2019 +1 days VulDB entry created
08/16/2019 +0 days VulDB last update
CVE: CVE-2019-12809 (🔒)Created: 08/16/2019 07:11 AM
Upgrade your account now!