Количество 4
Количество 4
CVE-2020-36986
Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.
CVE-2020-36986
Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.
CVE-2020-36986
Prey 1.9.6 contains an unquoted service path vulnerability that allows ...
GHSA-5ww3-f86g-j763
Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-36986 Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot. | CVSS3: 7.8 | 0% Низкий | 12 дней назад | |
CVE-2020-36986 Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot. | CVSS3: 7.8 | 0% Низкий | 12 дней назад | |
CVE-2020-36986 Prey 1.9.6 contains an unquoted service path vulnerability that allows ... | CVSS3: 7.8 | 0% Низкий | 12 дней назад | |
GHSA-5ww3-f86g-j763 Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot. | CVSS3: 7.8 | 0% Низкий | 12 дней назад |
Уязвимостей на страницу