Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c4w6-j3g6-98w3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Untrusted search path vulnerability in Sothink SWF Decompiler 6.0 Build 610 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .flv file. NOTE: some of these details are obtained from third party information.

Untrusted search path vulnerability in Sothink SWF Decompiler 6.0 Build 610 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .flv file. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 22%
0.0007
Низкий

Связанные уязвимости

nvd
больше 13 лет назад

Untrusted search path vulnerability in Sothink SWF Decompiler 6.0 Build 610 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .flv file. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 22%
0.0007
Низкий