Логотип exploitDog
bind:CVE-2023-54338
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-54338

Количество 2

Количество 2

nvd логотип

CVE-2023-54338

26 дней назад

Tftpd32 SE 4.60 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will be run with system-level permissions.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-xgq4-gwmr-jvcm

26 дней назад

Tftpd32 SE 4.60 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will be run with system-level permissions.

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-54338

Tftpd32 SE 4.60 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will be run with system-level permissions.

CVSS3: 8.4
0%
Низкий
26 дней назад
github логотип
GHSA-xgq4-gwmr-jvcm

Tftpd32 SE 4.60 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will be run with system-level permissions.

CVSS3: 8.4
0%
Низкий
26 дней назад

Уязвимостей на страницу