Логотип exploitDog
bind:CVE-2021-27032
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-27032

Количество 2

Количество 2

nvd логотип

CVE-2021-27032

больше 4 лет назад

Autodesk Licensing Installer was found to be vulnerable to privilege escalation issues. A malicious user with limited privileges could run any number of tools on a system to identify services that are configured with weak permissions and are running under elevated privileges. These weak permissions could allow all users on the operating system to modify the service configuration and take ownership of the service.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-ghc3-cx2g-84m5

больше 3 лет назад

Autodesk Licensing Services was found to be vulnerable to privilege escalation issues. A limited privileges malicious user could run any number of tools on a system to identify services which are configured with weak permissions and are running under elevated privileges. These weak permissions could allow all users on the operating system to modify the service configuration, and take ownership of the service. This issue was found by an external security researcher.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-27032

Autodesk Licensing Installer was found to be vulnerable to privilege escalation issues. A malicious user with limited privileges could run any number of tools on a system to identify services that are configured with weak permissions and are running under elevated privileges. These weak permissions could allow all users on the operating system to modify the service configuration and take ownership of the service.

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-ghc3-cx2g-84m5

Autodesk Licensing Services was found to be vulnerable to privilege escalation issues. A limited privileges malicious user could run any number of tools on a system to identify services which are configured with weak permissions and are running under elevated privileges. These weak permissions could allow all users on the operating system to modify the service configuration, and take ownership of the service. This issue was found by an external security researcher.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу