7.8
CVE-2019-20456
- EPSS 0.14%
- Veröffentlicht 16.02.2020 19:15:10
- Zuletzt bearbeitet 21.11.2024 04:38:31
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Goverlan ≫ Client Agent Version < 9.20.50
Goverlan ≫ Reach Console Version < 9.50
Goverlan ≫ Reach Server Version < 3.50
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.342 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 4.4 | 3.4 | 6.4 |
AV:L/AC:M/Au:N/C:P/I:P/A:P
|
CWE-426 Untrusted Search Path
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.