Логотип exploitDog
bind:CVE-2020-7358
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-7358

Количество 2

Количество 2

nvd логотип

CVE-2020-7358

больше 5 лет назад

In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-p48v-p5pg-6rp4

больше 3 лет назад

In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-7358

In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.

CVSS3: 5.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-p48v-p5pg-6rp4

In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу