Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2019-10679
Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
27.8%
CVSS Severity
CVSS v3 Score
7.8
CVSS v2 Score
7.2
References
http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-File-Permissions.html
http://seclists.org/fulldisclosure/2020/Aug/19
https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-service-executable-in-eikon-thomson-reuters-cve-2019-10679/
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
https://www.thomsonreuters.com/en/products-services.html
http://packetstormsecurity.com/files/158989/Eikon-Thomson-Reuters-4.0.42144-File-Permissions.html
http://seclists.org/fulldisclosure/2020/Aug/19
https://sec-consult.com/en/blog/advisories/extensive-file-permissions-on-service-executable-in-eikon-thomson-reuters-cve-2019-10679/
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
https://www.thomsonreuters.com/en/products-services.html
Products affected by CVE-2019-10679
Thomsonreuters
»
Eikon
»
Version:
4.0.42144
cpe:2.3:a:thomsonreuters:eikon:4.0.42144
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved