Логотип exploitDog
bind:CVE-2019-19620
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19620

Количество 2

Количество 2

nvd логотип

CVE-2019-19620

около 6 лет назад

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.

CVSS3: 3.3
EPSS: Низкий
github логотип

GHSA-rxc8-x669-7284

больше 3 лет назад

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a malicious file.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-19620

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file.

CVSS3: 3.3
0%
Низкий
около 6 лет назад
github логотип
GHSA-rxc8-x669-7284

In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a malicious file.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу