Логотип exploitDog
bind:CVE-2020-13542
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-13542

Количество 2

Количество 2

nvd логотип

CVE-2020-13542

около 5 лет назад

A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-wmhr-fwp2-cchm

больше 3 лет назад

A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-13542

A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.

CVSS3: 7.8
0%
Низкий
около 5 лет назад
github логотип
GHSA-wmhr-fwp2-cchm

A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу