Логотип exploitDog
bind:CVE-2021-47773
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47773

Количество 2

Количество 2

nvd логотип

CVE-2021-47773

24 дня назад

Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers can exploit the unquoted binary path by placing malicious executables in the service's file path to gain Local System access.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-96hh-fpgr-2f83

24 дня назад

Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers can exploit the unquoted binary path by placing malicious executables in the service's file path to gain Local System access.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-47773

Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers can exploit the unquoted binary path by placing malicious executables in the service's file path to gain Local System access.

CVSS3: 7.8
0%
Низкий
24 дня назад
github логотип
GHSA-96hh-fpgr-2f83

Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers can exploit the unquoted binary path by placing malicious executables in the service's file path to gain Local System access.

CVSS3: 7.8
0%
Низкий
24 дня назад

Уязвимостей на страницу