Описание
Untrusted search path vulnerability in LINGO 11.0.1.6 and 12.0.2.20 allows local users to gain privileges via a Trojan horse myuser.dll file in the current working directory, as demonstrated by a directory that contains a .ltf file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:lindo:lingo:11.0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:lindo:lingo:12.0.2.20:*:*:*:*:*:*:*
EPSS
Процентиль: 22%
0.0007
Низкий
6.9 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Untrusted search path vulnerability in LINGO 11.0.1.6 and 12.0.2.20 allows local users to gain privileges via a Trojan horse myuser.dll file in the current working directory, as demonstrated by a directory that contains a .ltf file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
EPSS
Процентиль: 22%
0.0007
Низкий
6.9 Medium
CVSS2
Дефекты
NVD-CWE-Other