Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:totalav:totalav:5.15.69:*:*:*:*:*:*:* |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totalav
Totalav totalav |
|
| Vendors & Products |
Totalav
Totalav totalav |
Thu, 15 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TotalAV 5.15.69 contains an unquoted service path vulnerability in multiple system services running with LocalSystem privileges. Attackers can place malicious executables in specific unquoted path segments to potentially gain SYSTEM-level access by exploiting the service path configuration. | |
| Title | TotalAV 5.15.69 - Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:06:10.799Z
Reserved: 2026-01-14T14:39:44.738Z
Link: CVE-2021-47787
Updated: 2026-01-16T15:53:41.546Z
Status : Analyzed
Published: 2026-01-16T00:16:22.073
Modified: 2026-02-09T14:08:05.210
Link: CVE-2021-47787
No data.
OpenCVE Enrichment
Updated: 2026-01-16T13:42:05Z