Логотип exploitDog
bind:CVE-2024-11220
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-11220

Количество 2

Количество 2

nvd логотип

CVE-2024-11220

около 1 года назад

A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-qv8f-7m6r-v8hp

около 1 года назад

A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-11220

A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.

CVSS3: 7.8
0%
Низкий
около 1 года назад
github логотип
GHSA-qv8f-7m6r-v8hp

A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.

CVSS3: 7.8
0%
Низкий
около 1 года назад

Уязвимостей на страницу