Логотип exploitDog
bind:CVE-2020-36986
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36986

Количество 4

Количество 4

ubuntu логотип

CVE-2020-36986

12 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2020-36986

12 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2020-36986

12 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-5ww3-f86g-j763

12 дней назад

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-36986

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
0%
Низкий
12 дней назад
nvd логотип
CVE-2020-36986

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
0%
Низкий
12 дней назад
debian логотип
CVE-2020-36986

Prey 1.9.6 contains an unquoted service path vulnerability that allows ...

CVSS3: 7.8
0%
Низкий
12 дней назад
github логотип
GHSA-5ww3-f86g-j763

Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.

CVSS3: 7.8
0%
Низкий
12 дней назад

Уязвимостей на страницу