Nssm224 Privilege - Escalation Updated

An attacker could exploit this vulnerability by creating a specially crafted configuration file and placing it in a directory that NSSM reads from. When NSSM reads the configuration file, it could execute the attacker's malicious code with elevated privileges.

X
Thanks
for downloading Swift Publisher
Subscribe to our newsletter for getting special offers and news about BeLight products