Логотип exploitDog
bind:CVE-2020-37060
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37060

Количество 2

Количество 2

nvd логотип

CVE-2020-37060

9 дней назад

Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-qx3j-ph5m-vrv9

9 дней назад

Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37060

Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access.

CVSS3: 7.8
0%
Низкий
9 дней назад
github логотип
GHSA-qx3j-ph5m-vrv9

Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access.

CVSS3: 7.8
0%
Низкий
9 дней назад

Уязвимостей на страницу