Yes24ViewerX ActiveX Control up to 1.0.327.50126 Argument Remote Code Execution – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 17th, 2019 📆 | 6611 Views ⚑


Yes24ViewerX ActiveX Control up to 1.0.327.50126 Argument Remote Code Execution

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability was found in Yes24ViewerX ActiveX Control up to 1.0.327.50126. It has been rated as critical. This issue affects some unknown processing. The manipulation as part of a Argument leads to a privilege escalation vulnerability (Code Execution). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was released 08/15/2019. The identification of this vulnerability is CVE-2019-12809 since 06/13/2019. The attack may be initiated remotely. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/16/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.3

VulDB Base Score: ≈6.3
VulDB Temp Score: ≈6.3
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation / Code Execution (CWE-269)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

06/13/2019 CVE assigned
08/15/2019 +63 days Advisory disclosed
08/16/2019 +1 days VulDB entry created
08/16/2019 +0 days VulDB last update
CVE: CVE-2019-12809 (🔒)Created: 08/16/2019 07:11 AM
Complete: 🔍

Upgrade your account now!

Tagged with:

Leave a Reply