Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gcrr-wmq9-gv5w

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."

The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."

EPSS

Процентиль: 92%
0.07544
Низкий

Связанные уязвимости

nvd
больше 12 лет назад

The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."

EPSS

Процентиль: 92%
0.07544
Низкий