Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 14 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sandboxie
Sandboxie sandboxie Sandboxie-plus Sandboxie-plus sandboxie |
|
| Vendors & Products |
Sandboxie
Sandboxie sandboxie Sandboxie-plus Sandboxie-plus sandboxie |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sandboxie-Plus 5.50.2 contains an unquoted service path vulnerability in the SbieSvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup. | |
| Title | Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-14T15:35:50.855Z
Reserved: 2026-01-11T13:34:26.327Z
Link: CVE-2022-50920
Updated: 2026-01-14T15:35:48.298Z
Status : Awaiting Analysis
Published: 2026-01-13T23:15:55.783
Modified: 2026-01-14T16:25:12.057
Link: CVE-2022-50920
No data.
OpenCVE Enrichment
Updated: 2026-01-14T10:49:12Z