Siemens Solid Edge SEListCtrlX ActiveX control is prone to an arbritrary memory write vulnerability because the application fails to perform adequate boundary checks on user-supplied data. This module runs a web server waiting for vulnerable clients (Internet Explorer 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Exploit Platform
Exploit Type
Product Name