Total vulnerabilities in the database
A local attacker can gain administrative privileges by inserting an executable file in the path of the affected product.
Software | From | Fixed in |
---|---|---|
wut / com_port_redirector_legacy | - | 3.93.x |
wut / com_port_redirector_plug_&_play | - | 4.42.x |
wut / opc_server | - | 4.88.x |