Логотип exploitDog
bind:CVE-2013-0687
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-0687

Количество 2

Количество 2

nvd логотип

CVE-2013-0687

почти 13 лет назад

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

CVSS2: 6.6
EPSS: Низкий
github логотип

GHSA-jx6v-qprr-23fv

больше 3 лет назад

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-0687

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

CVSS2: 6.6
0%
Низкий
почти 13 лет назад
github логотип
GHSA-jx6v-qprr-23fv

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу