Логотип exploitDog
bind:CVE-2020-28046
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-28046

Количество 2

Количество 2

nvd логотип

CVE-2020-28046

больше 5 лет назад

An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-2cg6-qwvv-86qv

больше 3 лет назад

An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-28046

An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.

CVSS3: 7.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-2cg6-qwvv-86qv

An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу