Логотип exploitDog
bind:CVE-2021-38469
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-38469

Количество 2

Количество 2

nvd логотип

CVE-2021-38469

больше 4 лет назад

Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-p8fh-8437-rr8p

больше 3 лет назад

Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-38469

Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-p8fh-8437-rr8p

Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу