Логотип exploitDog
bind:CVE-2019-19470
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19470

Количество 2

Количество 2

nvd логотип

CVE-2019-19470

около 6 лет назад

Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-fx9h-h562-86qx

больше 3 лет назад

An attacker who has already compromised the local system could use TinyWall Controller to gain additional privileges by attaching a debugger to the running process and modifying the code in memory. Vulnerability fixed in version 2.1.13.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-19470

Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
github логотип
GHSA-fx9h-h562-86qx

An attacker who has already compromised the local system could use TinyWall Controller to gain additional privileges by attaching a debugger to the running process and modifying the code in memory. Vulnerability fixed in version 2.1.13.

CVSS3: 7.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу