Логотип exploitDog
bind:CVE-2020-0951
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-0951

Количество 4

Количество 4

nvd логотип

CVE-2020-0951

почти 5 лет назад

<p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.</p> <p>To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.</p> <p>The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.</p>

CVSS3: 6.7
EPSS: Низкий
msrc логотип

CVE-2020-0951

почти 4 года назад

Windows Defender Application Control Security Feature Bypass Vulnerability

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-72c6-539v-q92f

около 3 лет назад

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2020-04320

почти 5 лет назад

Уязвимость средства контроля приложений Управление приложениями в Защитнике Windows (Windows Defender Application Control, WDAC) средства автоматизации PowerShell Core, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-0951

<p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.</p> <p>To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.</p> <p>The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.</p>

CVSS3: 6.7
3%
Низкий
почти 5 лет назад
msrc логотип
CVE-2020-0951

Windows Defender Application Control Security Feature Bypass Vulnerability

CVSS3: 6.7
3%
Низкий
почти 4 года назад
github логотип
GHSA-72c6-539v-q92f

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.

CVSS3: 6.7
3%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-04320

Уязвимость средства контроля приложений Управление приложениями в Защитнике Windows (Windows Defender Application Control, WDAC) средства автоматизации PowerShell Core, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
3%
Низкий
почти 5 лет назад

Уязвимостей на страницу