Логотип exploitDog
bind:CVE-2024-51448
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-51448

Количество 3

Количество 3

nvd логотип

CVE-2024-51448

около 1 года назад

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-6pxp-6h5g-5389

около 1 года назад

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2025-00682

больше 1 года назад

Уязвимость установщика программного средства автоматизации бизнес-процессов IBM Robotic Process Automation, позволяющая нарушителю повысить свои привилегии

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-51448

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

CVSS3: 6.7
0%
Низкий
около 1 года назад
github логотип
GHSA-6pxp-6h5g-5389

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

CVSS3: 6.7
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-00682

Уязвимость установщика программного средства автоматизации бизнес-процессов IBM Robotic Process Automation, позволяющая нарушителю повысить свои привилегии

CVSS3: 6.7
0%
Низкий
больше 1 года назад

Уязвимостей на страницу