Логотип exploitDog
bind:CVE-2020-36980
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36980

Количество 2

Количество 2

nvd логотип

CVE-2020-36980

12 дней назад

SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-85q3-6228-58f9

12 дней назад

SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36980

SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.

CVSS3: 7.8
0%
Низкий
12 дней назад
github логотип
GHSA-85q3-6228-58f9

SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions.

CVSS3: 7.8
0%
Низкий
12 дней назад

Уязвимостей на страницу