Логотип exploitDog
bind:CVE-2021-47883
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47883

Количество 2

Количество 2

nvd логотип

CVE-2021-47883

19 дней назад

Sandboxie Plus 0.7.2 contains an unquoted service path vulnerability in the SbieSvc service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions during service startup.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-jcwp-q8h7-72pm

19 дней назад

Sandboxie Plus 0.7.2 contains an unquoted service path vulnerability in the SbieSvc service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions during service startup.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-47883

Sandboxie Plus 0.7.2 contains an unquoted service path vulnerability in the SbieSvc service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions during service startup.

CVSS3: 7.8
0%
Низкий
19 дней назад
github логотип
GHSA-jcwp-q8h7-72pm

Sandboxie Plus 0.7.2 contains an unquoted service path vulnerability in the SbieSvc service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions during service startup.

CVSS3: 7.8
0%
Низкий
19 дней назад

Уязвимостей на страницу