Логотип exploitDog
bind:CVE-2020-16282
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-16282

Количество 2

Количество 2

nvd логотип

CVE-2020-16282

около 5 лет назад

In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-23f4-r5mp-f393

больше 3 лет назад

In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-16282

In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.

CVSS3: 8.8
0%
Низкий
около 5 лет назад
github логотип
GHSA-23f4-r5mp-f393

In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу