Логотип exploitDog
bind:CVE-2020-27519
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-27519

Количество 2

Количество 2

nvd логотип

CVE-2020-27519

почти 5 лет назад

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-rxm5-9q2g-4c8r

больше 3 лет назад

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-27519

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

CVSS3: 7.8
0%
Низкий
почти 5 лет назад
github логотип
GHSA-rxm5-9q2g-4c8r

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу