Логотип exploitDog
bind:CVE-2014-0315
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-0315

Количество 3

Количество 3

nvd логотип

CVE-2014-0315

около 11 лет назад

Untrusted search path vulnerability in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse cmd.exe file in the current working directory, as demonstrated by a directory that contains a .bat or .cmd file, aka "Windows File Handling Vulnerability."

CVSS2: 6.9
EPSS: Средний
github логотип

GHSA-7wq4-3v4v-vpp7

около 3 лет назад

Untrusted search path vulnerability in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse cmd.exe file in the current working directory, as demonstrated by a directory that contains a .bat or .cmd file, aka "Windows File Handling Vulnerability."

EPSS: Средний
fstec логотип

BDU:2014-00084

около 11 лет назад

Уязвимость операционной системы Windows, позволяющая злоумышленнику выполнить произвольный код

CVSS2: 6.9
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-0315

Untrusted search path vulnerability in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse cmd.exe file in the current working directory, as demonstrated by a directory that contains a .bat or .cmd file, aka "Windows File Handling Vulnerability."

CVSS2: 6.9
30%
Средний
около 11 лет назад
github логотип
GHSA-7wq4-3v4v-vpp7

Untrusted search path vulnerability in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse cmd.exe file in the current working directory, as demonstrated by a directory that contains a .bat or .cmd file, aka "Windows File Handling Vulnerability."

30%
Средний
около 3 лет назад
fstec логотип
BDU:2014-00084

Уязвимость операционной системы Windows, позволяющая злоумышленнику выполнить произвольный код

CVSS2: 6.9
30%
Средний
около 11 лет назад

Уязвимостей на страницу