Логотип exploitDog
bind:CVE-2022-50920
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50920

Количество 2

Количество 2

nvd логотип

CVE-2022-50920

27 дней назад

Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-2jpm-7mpv-5fjm

27 дней назад

Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-50920

Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.

CVSS3: 8.4
0%
Низкий
27 дней назад
github логотип
GHSA-2jpm-7mpv-5fjm

Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.

CVSS3: 8.4
0%
Низкий
27 дней назад

Уязвимостей на страницу