Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

select and research a vulnerable software. You will then discover a correspondin

ID: 3756987 • Letter: S

Question

select and research a vulnerable software. You will then discover a corresponding exploit from the website exploit-db.com . The exploit must results in remote code execution and should be a buffer overrun.

Software:______________________________________________________________

Software version:________________________________________________________

Vulnerability:___________________________________________________________

Link to announcement:___________________________________________________

Type of Vulnerability:_____________________________________________________

Exploit Name:__________________________________________________________

Exploit Link:____________________________________________________________

Purpose of Exploit: ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Explanation / Answer

I have found a vulnerability matching the above requirements. Here it is ,

Operating System: Windows 7 Professional (x86_64)/ Ultimate (x86_64)

Software Targetted: Operation Technology ETAP 14.1.0

Software Version: 14.1.0

Vulnerability:

Link To Announcement: Exploit-DB

Type of Vulnerability:

Exploit Name:

Purpose of Exploit:

Hence, this is the reason behind the vulnerability and the fix for the vulnerability can also be found out in the same.