Home / Vulnerability Database / 1C : COM objects usage
1C
1C : COM objects usage
Overview
The application uses COM objects. The use of these objects extend the capabilities of the platform 1C. Any configuration capabilities to execute “external” code or arbitrary queries on the server that are not part of the application itself pose a serious threat. Perhaps it is malicious code or external objects used are unsafe.
LOW
DerScanner Severity Score
Do you want to fix 1C : COM objects usage in your application?
See also
1C
1C : Null encryption key
1C
1C : Memory leak
1C
