Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 03 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-266 |
Wed, 31 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-59 | |
| CPEs | cpe:2.3:a:zillya:total_security:3.0.2367.0:*:*:*:*:*:*:* |
Wed, 24 Dec 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zillya
Zillya total Security |
|
| Vendors & Products |
Zillya
Zillya total Security |
Mon, 22 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability that allows low-privileged users to copy files to unauthorized system locations using the quarantine module. Attackers can leverage symbolic link techniques to restore quarantined files to restricted directories, potentially enabling system-level access through techniques like DLL hijacking. | |
| Title | Zillya Total Security 3.0.2367.0 Local Privilege Escalation via Quarantine Module | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-03T20:46:28.195Z
Reserved: 2025-12-20T16:31:20.899Z
Link: CVE-2023-53973
Updated: 2025-12-22T21:58:38.570Z
Status : Modified
Published: 2025-12-22T22:16:02.467
Modified: 2026-01-03T21:15:42.663
Link: CVE-2023-53973
No data.
OpenCVE Enrichment
Updated: 2025-12-24T11:53:24Z