Описание
Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.
Ссылки
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:32-bit:*:*:*:*:*
Одно из
cpe:2.3:a:pandasecurity:panda_antivirus:2010:*:pro:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_global_protection:2010:*:*:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_internet_security:2010:*:pro:*:*:*:*:*
EPSS
Процентиль: 12%
0.00041
Низкий
7.2 High
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
почти 4 года назад
Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.
EPSS
Процентиль: 12%
0.00041
Низкий
7.2 High
CVSS2
Дефекты
CWE-264