Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqhq-2hf2-282r

Опубликовано: 14 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.7

Описание

The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.

The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.

EPSS

Процентиль: 1%
0.00014
Низкий

6.7 Medium

CVSS4

Дефекты

CWE-428

Связанные уязвимости

nvd
10 дней назад

The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.

EPSS

Процентиль: 1%
0.00014
Низкий

6.7 Medium

CVSS4

Дефекты

CWE-428