Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-13431

I2P before 0.9.46 allows local users to gain privileges via a Trojan horse I2PSvc.exe file because of weak permissions on a certain %PROGRAMFILES% subdirectory.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.7%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Products affected by CVE-2020-13431
  • Geti2p » I2p » Version: 0.8.10
    cpe:2.3:a:geti2p:i2p:0.8.10
  • Geti2p » I2p » Version: 0.8.11
    cpe:2.3:a:geti2p:i2p:0.8.11
  • Geti2p » I2p » Version: 0.8.12
    cpe:2.3:a:geti2p:i2p:0.8.12
  • Geti2p » I2p » Version: 0.8.13
    cpe:2.3:a:geti2p:i2p:0.8.13
  • Geti2p » I2p » Version: 0.8.9
    cpe:2.3:a:geti2p:i2p:0.8.9
  • Geti2p » I2p » Version: 0.9.0
    cpe:2.3:a:geti2p:i2p:0.9.0
  • Geti2p » I2p » Version: 0.9.1
    cpe:2.3:a:geti2p:i2p:0.9.1
  • Geti2p » I2p » Version: 0.9.10
    cpe:2.3:a:geti2p:i2p:0.9.10
  • Geti2p » I2p » Version: 0.9.11
    cpe:2.3:a:geti2p:i2p:0.9.11
  • Geti2p » I2p » Version: 0.9.12
    cpe:2.3:a:geti2p:i2p:0.9.12
  • Geti2p » I2p » Version: 0.9.13
    cpe:2.3:a:geti2p:i2p:0.9.13
  • Geti2p » I2p » Version: 0.9.14
    cpe:2.3:a:geti2p:i2p:0.9.14
  • Geti2p » I2p » Version: 0.9.15
    cpe:2.3:a:geti2p:i2p:0.9.15
  • Geti2p » I2p » Version: 0.9.16
    cpe:2.3:a:geti2p:i2p:0.9.16
  • Geti2p » I2p » Version: 0.9.17
    cpe:2.3:a:geti2p:i2p:0.9.17
  • Geti2p » I2p » Version: 0.9.18
    cpe:2.3:a:geti2p:i2p:0.9.18
  • Geti2p » I2p » Version: 0.9.19
    cpe:2.3:a:geti2p:i2p:0.9.19
  • Geti2p » I2p » Version: 0.9.2
    cpe:2.3:a:geti2p:i2p:0.9.2
  • Geti2p » I2p » Version: 0.9.20
    cpe:2.3:a:geti2p:i2p:0.9.20
  • Geti2p » I2p » Version: 0.9.21
    cpe:2.3:a:geti2p:i2p:0.9.21
  • Geti2p » I2p » Version: 0.9.22
    cpe:2.3:a:geti2p:i2p:0.9.22
  • Geti2p » I2p » Version: 0.9.23
    cpe:2.3:a:geti2p:i2p:0.9.23
  • Geti2p » I2p » Version: 0.9.24
    cpe:2.3:a:geti2p:i2p:0.9.24
  • Geti2p » I2p » Version: 0.9.25
    cpe:2.3:a:geti2p:i2p:0.9.25
  • Geti2p » I2p » Version: 0.9.26
    cpe:2.3:a:geti2p:i2p:0.9.26
  • Geti2p » I2p » Version: 0.9.27
    cpe:2.3:a:geti2p:i2p:0.9.27
  • Geti2p » I2p » Version: 0.9.28
    cpe:2.3:a:geti2p:i2p:0.9.28
  • Geti2p » I2p » Version: 0.9.29
    cpe:2.3:a:geti2p:i2p:0.9.29
  • Geti2p » I2p » Version: 0.9.3
    cpe:2.3:a:geti2p:i2p:0.9.3
  • Geti2p » I2p » Version: 0.9.30
    cpe:2.3:a:geti2p:i2p:0.9.30
  • Geti2p » I2p » Version: 0.9.31
    cpe:2.3:a:geti2p:i2p:0.9.31
  • Geti2p » I2p » Version: 0.9.32
    cpe:2.3:a:geti2p:i2p:0.9.32
  • Geti2p » I2p » Version: 0.9.33
    cpe:2.3:a:geti2p:i2p:0.9.33
  • Geti2p » I2p » Version: 0.9.34
    cpe:2.3:a:geti2p:i2p:0.9.34
  • Geti2p » I2p » Version: 0.9.35
    cpe:2.3:a:geti2p:i2p:0.9.35
  • Geti2p » I2p » Version: 0.9.36
    cpe:2.3:a:geti2p:i2p:0.9.36
  • Geti2p » I2p » Version: 0.9.37
    cpe:2.3:a:geti2p:i2p:0.9.37
  • Geti2p » I2p » Version: 0.9.38
    cpe:2.3:a:geti2p:i2p:0.9.38
  • Geti2p » I2p » Version: 0.9.39
    cpe:2.3:a:geti2p:i2p:0.9.39
  • Geti2p » I2p » Version: 0.9.4
    cpe:2.3:a:geti2p:i2p:0.9.4
  • Geti2p » I2p » Version: 0.9.40
    cpe:2.3:a:geti2p:i2p:0.9.40
  • Geti2p » I2p » Version: 0.9.41
    cpe:2.3:a:geti2p:i2p:0.9.41
  • Geti2p » I2p » Version: 0.9.42
    cpe:2.3:a:geti2p:i2p:0.9.42
  • Geti2p » I2p » Version: 0.9.43
    cpe:2.3:a:geti2p:i2p:0.9.43
  • Geti2p » I2p » Version: 0.9.44
    cpe:2.3:a:geti2p:i2p:0.9.44
  • Geti2p » I2p » Version: 0.9.45
    cpe:2.3:a:geti2p:i2p:0.9.45
  • Geti2p » I2p » Version: 0.9.5
    cpe:2.3:a:geti2p:i2p:0.9.5
  • Geti2p » I2p » Version: 0.9.6
    cpe:2.3:a:geti2p:i2p:0.9.6
  • Geti2p » I2p » Version: 0.9.7
    cpe:2.3:a:geti2p:i2p:0.9.7
  • Geti2p » I2p » Version: 0.9.7.1
    cpe:2.3:a:geti2p:i2p:0.9.7.1
  • Geti2p » I2p » Version: 0.9.8
    cpe:2.3:a:geti2p:i2p:0.9.8
  • Geti2p » I2p » Version: 0.9.8.1
    cpe:2.3:a:geti2p:i2p:0.9.8.1
  • Geti2p » I2p » Version: 0.9.9
    cpe:2.3:a:geti2p:i2p:0.9.9


Contact Us

Shodan ® - All rights reserved