Home / Vulnerability Database / 1C : COM objects usage
1C

1C : COM objects usage

Classification

CWE/SANS Top 25 2011

Overview

The application uses COM objects. The use of these objects extend the capabilities of the platform 1C. Any configuration capabilities to execute “external” code or arbitrary queries on the server that are not part of the application itself pose a serious threat. Perhaps it is malicious code or external objects used are unsafe.

LOW

DerScanner Severity Score

Do you want to fix 1C : COM objects usage in your application?

See also

1C

1C : Null encryption key

1C

1C : Memory leak

1C

1C : Empty encryption key