Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vm6-5mqx-h27m

Опубликовано: 19 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.

When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.

EPSS

Процентиль: 5%
0.00022
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-427

Связанные уязвимости

nvd
3 месяца назад

When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.

EPSS

Процентиль: 5%
0.00022
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-427