Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2vmv-r5mh-gqqw

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.

The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.

EPSS

Процентиль: 94%
0.1309
Средний

Связанные уязвимости

nvd
больше 18 лет назад

The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.

EPSS

Процентиль: 94%
0.1309
Средний