Описание
Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:thomsonreuters:eikon:4.0.42144:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00148
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-276
Связанные уязвимости
github
больше 3 лет назад
Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.
EPSS
Процентиль: 35%
0.00148
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-276