Vulnerability Details CVE-2019-16860
Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated privilege on the local machine.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.6%
CVSS Severity
CVSS v3 Score 7.3
CVSS v2 Score 6.9
Products affected by CVE-2019-16860
-
cpe:2.3:a:code42:code42:3.1
-
cpe:2.3:a:code42:code42:3.2
-
cpe:2.3:a:code42:code42:3.2.1
-
cpe:2.3:a:code42:code42:3.3
-
cpe:2.3:a:code42:code42:3.4.1
-
cpe:2.3:a:code42:code42:3.5
-
cpe:2.3:a:code42:code42:3.5.2
-
cpe:2.3:a:code42:code42:3.5.3
-
cpe:2.3:a:code42:code42:3.5.4
-
cpe:2.3:a:code42:code42:3.5.5
-
cpe:2.3:a:code42:code42:3.6.1
-
cpe:2.3:a:code42:code42:3.6.2.1
-
cpe:2.3:a:code42:code42:3.6.3.1
-
cpe:2.3:a:code42:code42:3.6.3.2
-
cpe:2.3:a:code42:code42:3.6.4
-
cpe:2.3:a:code42:code42:3.6.4.1
-
cpe:2.3:a:code42:code42:3.6.4.3
-
cpe:2.3:a:code42:code42:3.6.5
-
cpe:2.3:a:code42:code42:3.6.5.1
-
cpe:2.3:a:code42:code42:4.1.3
-
cpe:2.3:a:code42:code42:4.1.4
-
cpe:2.3:a:code42:code42:4.1.5
-
cpe:2.3:a:code42:code42:4.1.5.1
-
cpe:2.3:a:code42:code42:4.1.6
-
cpe:2.3:a:code42:code42:4.1.6.3
-
cpe:2.3:a:code42:code42:4.1.7
-
cpe:2.3:a:code42:code42:4.1.8
-
cpe:2.3:a:code42:code42:4.1.8.1
-
cpe:2.3:a:code42:code42:4.2
-
cpe:2.3:a:code42:code42:4.2.0
-
cpe:2.3:a:code42:code42:4.2.1
-
cpe:2.3:a:code42:code42:4.2.2
-
cpe:2.3:a:code42:code42:4.2.3
-
cpe:2.3:a:code42:code42:4.2.3.1
-
cpe:2.3:a:code42:code42:4.3
-
cpe:2.3:a:code42:code42:4.3.0
-
cpe:2.3:a:code42:code42:4.3.2
-
cpe:2.3:a:code42:code42:4.3.4
-
cpe:2.3:a:code42:code42:4.3.4.1
-
cpe:2.3:a:code42:code42:4.3.5
-
cpe:2.3:a:code42:code42:4.3.5.1
-
cpe:2.3:a:code42:code42:4.3.5.2
-
cpe:2.3:a:code42:code42:4.3.5.3
-
cpe:2.3:a:code42:code42:5.0
-
cpe:2.3:a:code42:code42:5.0.1
-
cpe:2.3:a:code42:code42:5.0.2
-
cpe:2.3:a:code42:code42:5.0.3
-
cpe:2.3:a:code42:code42:5.1
-
cpe:2.3:a:code42:code42:5.1.2
-
cpe:2.3:a:code42:code42:5.1.2.1
-
cpe:2.3:a:code42:code42:5.2
-
cpe:2.3:a:code42:code42:5.2.0
-
cpe:2.3:a:code42:code42:5.2.0.1
-
cpe:2.3:a:code42:code42:5.2.1
-
cpe:2.3:a:code42:code42:5.3
-
cpe:2.3:a:code42:code42:5.3.0
-
cpe:2.3:a:code42:code42:5.3.1
-
cpe:2.3:a:code42:code42:5.3.2
-
cpe:2.3:a:code42:code42:5.4
-
cpe:2.3:a:code42:code42:5.4.0
-
cpe:2.3:a:code42:code42:5.4.1
-
cpe:2.3:a:code42:code42:5.4.2
-
cpe:2.3:a:code42:code42:5.4.3
-
cpe:2.3:a:code42:code42:5.4.4
-
cpe:2.3:a:code42:code42:5.4.5
-
cpe:2.3:a:code42:code42:6.0
-
cpe:2.3:a:code42:code42:6.0.0
-
cpe:2.3:a:code42:code42:6.0.1
-
cpe:2.3:a:code42:code42:6.0.2
-
cpe:2.3:a:code42:code42:6.0.3
-
cpe:2.3:a:code42:code42:6.0.4
-
cpe:2.3:a:code42:code42:6.0.5
-
cpe:2.3:a:code42:code42:6.1
-
cpe:2.3:a:code42:code42:6.5
-
cpe:2.3:a:code42:code42:6.5.0
-
cpe:2.3:a:code42:code42:6.5.1
-
cpe:2.3:a:code42:code42:6.5.2
-
cpe:2.3:a:code42:code42:6.6
-
cpe:2.3:a:code42:code42:6.7
-
cpe:2.3:a:code42:code42:6.7.2
-
cpe:2.3:a:code42:code42:6.7.3
-
cpe:2.3:a:code42:code42:6.7.4
-
cpe:2.3:a:code42:code42:6.7.5
-
cpe:2.3:a:code42:code42:6.7.6
-
cpe:2.3:a:code42:code42:6.8
-
cpe:2.3:a:code42:code42:6.8.4
-
cpe:2.3:a:code42:code42:6.8.5
-
cpe:2.3:a:code42:code42:6.8.6
-
cpe:2.3:a:code42:code42:6.8.7
-
cpe:2.3:a:code42:code42:6.8.8
-
cpe:2.3:a:code42:code42:6.8.9
-
cpe:2.3:a:code42:code42:6.9.0
-
cpe:2.3:a:code42:code42:6.9.1
-
cpe:2.3:a:code42:code42:7.0.0
-
cpe:2.3:a:code42:code42:7.0.2
-
cpe:2.3:o:microsoft:windows:-