Количество 4
Количество 4
CVE-2021-1386
A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.
CVE-2021-1386
GHSA-crcr-fw92-82g6
A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.
BDU:2021-02017
Уязвимость средств защиты Cisco Immune, Cisco Advanced Malware Protection for Endpoints for Windows и пакета антивирусных программ ClamAV for Windows, связанная с ошибками механизма проверки пути поиска динамически подключаемых библиотек (DLL), позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-1386 A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. | CVSS3: 7 | 0% Низкий | почти 5 лет назад | |
CVSS3: 7.8 | 0% Низкий | почти 5 лет назад | ||
GHSA-crcr-fw92-82g6 A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. | 0% Низкий | больше 3 лет назад | ||
BDU:2021-02017 Уязвимость средств защиты Cisco Immune, Cisco Advanced Malware Protection for Endpoints for Windows и пакета антивирусных программ ClamAV for Windows, связанная с ошибками механизма проверки пути поиска динамически подключаемых библиотек (DLL), позволяющая нарушителю выполнить произвольный код | CVSS3: 7 | 0% Низкий | почти 5 лет назад |
Уязвимостей на страницу