Логотип exploitDog
bind:CVE-2018-7281
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-7281

Количество 2

Количество 2

nvd логотип

CVE-2018-7281

почти 8 лет назад

CactusVPN 5.3.6 for macOS contains a root privilege escalation vulnerability through a setuid root binary called runme. The binary takes a single command line argument and passes this argument to a system() call, thus allowing low privileged users to execute commands as root.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-2p69-65qq-262h

больше 3 лет назад

CactusVPN 5.3.6 for macOS contains a root privilege escalation vulnerability through a setuid root binary called runme. The binary takes a single command line argument and passes this argument to a system() call, thus allowing low privileged users to execute commands as root.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-7281

CactusVPN 5.3.6 for macOS contains a root privilege escalation vulnerability through a setuid root binary called runme. The binary takes a single command line argument and passes this argument to a system() call, thus allowing low privileged users to execute commands as root.

CVSS3: 8.8
0%
Низкий
почти 8 лет назад
github логотип
GHSA-2p69-65qq-262h

CactusVPN 5.3.6 for macOS contains a root privilege escalation vulnerability through a setuid root binary called runme. The binary takes a single command line argument and passes this argument to a system() call, thus allowing low privileged users to execute commands as root.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу