Логотип exploitDog
bind:CVE-2020-10589
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-10589

Количество 2

Количество 2

nvd логотип

CVE-2020-10589

почти 6 лет назад

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-6ppr-fg8v-vwjq

больше 3 лет назад

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-10589

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-6ppr-fg8v-vwjq

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу