select and research a vulnerable software. You will then discover a correspondin
ID: 3756987 • Letter: S
Question
select and research a vulnerable software. You will then discover a corresponding exploit from the website exploit-db.com . The exploit must results in remote code execution and should be a buffer overrun.
Software:______________________________________________________________
Software version:________________________________________________________
Vulnerability:___________________________________________________________
Link to announcement:___________________________________________________
Type of Vulnerability:_____________________________________________________
Exploit Name:__________________________________________________________
Exploit Link:____________________________________________________________
Purpose of Exploit: ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Explanation / Answer
I have found a vulnerability matching the above requirements. Here it is ,
Operating System: Windows 7 Professional (x86_64)/ Ultimate (x86_64)
Software Targetted: Operation Technology ETAP 14.1.0
Software Version: 14.1.0
Vulnerability:
Link To Announcement: Exploit-DB
Type of Vulnerability:
Exploit Name:
Purpose of Exploit:
Hence, this is the reason behind the vulnerability and the fix for the vulnerability can also be found out in the same.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.