### [CVE-2024-7059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7059) ![](https://img.shields.io/static/v1?label=Product&message=Genetec%20Security%20Center&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C5.8.2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D5.10.0.0%20%3C5.10.4.23%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D5.11.0.0%20%3C5.11.3.13%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D5.12.0.0%20%3C5.12.1.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D5.12.2.0%20%3C5.12.2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D5.9.0.0%20%3C5.9.5.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.10.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.11.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.12.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.12.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.9.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20('Unsafe%20Reflection')&color=brightgreen) ### Description A high-severity vulnerability that can lead to arbitrary code execution on the system hosting the Web SDK role was found in the Genetec Security Center product line. ### POC #### Reference - https://resources.genetec.com/security-advisories/high-severity-vulnerability-affecting-security-center-web-sdk-role #### Github No PoCs found on GitHub currently.