ZDI-17-543: (0Day) Advantech WebAccess TpMegaJVT startSoundRecord Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-543: (0Day) Advantech WebAccess TpMegaJVT startSoundRecord Stack-based Buffer Overflow Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious

ZDI-17-516: Mitsubishi Electric E-Designer BECMpi Driver Configuration ClockDevice Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-516: Mitsubishi Electric E-Designer BECMpi Driver Configuration ClockDevice Stack-based Buffer Overflow Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mitsubishi Electric E-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious

ZDI-17-517: Mitsubishi Electric E-Designer BEYaskawaSMC Driver Configuration IPAddress Heap-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-517: Mitsubishi Electric E-Designer BEYaskawaSMC Driver Configuration IPAddress Heap-based Buffer Overflow Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mitsubishi Electric E-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious

ZDI-17-518: Mitsubishi Electric E-Designer BEMatsushita Driver Configuration TCP_IP_Address Heap-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-518: Mitsubishi Electric E-Designer BEMatsushita Driver Configuration TCP_IP_Address Heap-based Buffer Overflow Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mitsubishi Electric E-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious