Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Drive-software
Drive-software atomic Alarm Clock X86 |
|
| Vendors & Products |
Drive-software
Drive-software atomic Alarm Clock X86 |
Fri, 30 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named 'Program.exe' to gain persistent system-level access. | |
| Title | Atomic Alarm Clock x86 6.3 - 'AtomicAlarmClock' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-30T16:34:14.509Z
Reserved: 2026-01-28T18:18:30.526Z
Link: CVE-2020-37060
Updated: 2026-01-30T16:34:11.768Z
Status : Deferred
Published: 2026-01-30T17:16:12.217
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-37060
No data.
OpenCVE Enrichment
Updated: 2026-02-02T09:27:40Z