Логотип exploitDog
bind:CVE-2023-28892
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-28892

Количество 2

Количество 2

nvd логотип

CVE-2023-28892

больше 2 лет назад

Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xx2r-f4xg-6rg7

больше 2 лет назад

Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-28892

Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xx2r-f4xg-6rg7

Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу