Логотип exploitDog
bind:CVE-2021-28649
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-28649

Количество 3

Количество 3

nvd логотип

CVE-2021-28649

больше 4 лет назад

An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-9g8c-98vh-rgph

больше 3 лет назад

An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

EPSS: Низкий
fstec логотип

BDU:2021-03310

почти 5 лет назад

Уязвимость средства антивирусной защиты для домашних сетей Trend Micro HouseCall for Home Networks, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-28649

An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

CVSS3: 7.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-9g8c-98vh-rgph

An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03310

Уязвимость средства антивирусной защиты для домашних сетей Trend Micro HouseCall for Home Networks, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.3
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу