Логотип exploitDog
bind:CVE-2024-58315
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-58315

Количество 2

Количество 2

nvd логотип

CVE-2024-58315

около 1 месяца назад

Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-jv66-87h9-r6q4

около 1 месяца назад

Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-58315

Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-jv66-87h9-r6q4

Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.

CVSS3: 8.4
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу