Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-36986

Опубликовано: 28 янв. 2026
Источник: debian
EPSS Низкий

Описание

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
preyremovedpackage

EPSS

Процентиль: 2%
0.00013
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
9 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
nvd
10 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
github
10 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

EPSS

Процентиль: 2%
0.00013
Низкий