Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-29962 | In Malwarebytes before 4.5.23, a symbolic link may be used delete any arbitrary file on the system by exploiting the local quarantine system. It can also lead to privilege escalation in certain scenarios. |
Tue, 25 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-25T15:25:25.164Z
Reserved: 2023-02-20T00:00:00.000Z
Link: CVE-2023-26088
Updated: 2024-08-02T11:39:06.567Z
Status : Modified
Published: 2023-03-23T01:15:12.180
Modified: 2024-11-21T07:50:45.127
Link: CVE-2023-26088
No data.
OpenCVE Enrichment
No data.
EUVD