Vulnerability Details CVE-2020-13431
I2P before 0.9.46 allows local users to gain privileges via a Trojan horse I2PSvc.exe file because of weak permissions on a certain %PROGRAMFILES% subdirectory.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.7%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Products affected by CVE-2020-13431
-
cpe:2.3:a:geti2p:i2p:0.8.10
-
cpe:2.3:a:geti2p:i2p:0.8.11
-
cpe:2.3:a:geti2p:i2p:0.8.12
-
cpe:2.3:a:geti2p:i2p:0.8.13
-
cpe:2.3:a:geti2p:i2p:0.8.9
-
cpe:2.3:a:geti2p:i2p:0.9.0
-
cpe:2.3:a:geti2p:i2p:0.9.1
-
cpe:2.3:a:geti2p:i2p:0.9.10
-
cpe:2.3:a:geti2p:i2p:0.9.11
-
cpe:2.3:a:geti2p:i2p:0.9.12
-
cpe:2.3:a:geti2p:i2p:0.9.13
-
cpe:2.3:a:geti2p:i2p:0.9.14
-
cpe:2.3:a:geti2p:i2p:0.9.15
-
cpe:2.3:a:geti2p:i2p:0.9.16
-
cpe:2.3:a:geti2p:i2p:0.9.17
-
cpe:2.3:a:geti2p:i2p:0.9.18
-
cpe:2.3:a:geti2p:i2p:0.9.19
-
cpe:2.3:a:geti2p:i2p:0.9.2
-
cpe:2.3:a:geti2p:i2p:0.9.20
-
cpe:2.3:a:geti2p:i2p:0.9.21
-
cpe:2.3:a:geti2p:i2p:0.9.22
-
cpe:2.3:a:geti2p:i2p:0.9.23
-
cpe:2.3:a:geti2p:i2p:0.9.24
-
cpe:2.3:a:geti2p:i2p:0.9.25
-
cpe:2.3:a:geti2p:i2p:0.9.26
-
cpe:2.3:a:geti2p:i2p:0.9.27
-
cpe:2.3:a:geti2p:i2p:0.9.28
-
cpe:2.3:a:geti2p:i2p:0.9.29
-
cpe:2.3:a:geti2p:i2p:0.9.3
-
cpe:2.3:a:geti2p:i2p:0.9.30
-
cpe:2.3:a:geti2p:i2p:0.9.31
-
cpe:2.3:a:geti2p:i2p:0.9.32
-
cpe:2.3:a:geti2p:i2p:0.9.33
-
cpe:2.3:a:geti2p:i2p:0.9.34
-
cpe:2.3:a:geti2p:i2p:0.9.35
-
cpe:2.3:a:geti2p:i2p:0.9.36
-
cpe:2.3:a:geti2p:i2p:0.9.37
-
cpe:2.3:a:geti2p:i2p:0.9.38
-
cpe:2.3:a:geti2p:i2p:0.9.39
-
cpe:2.3:a:geti2p:i2p:0.9.4
-
cpe:2.3:a:geti2p:i2p:0.9.40
-
cpe:2.3:a:geti2p:i2p:0.9.41
-
cpe:2.3:a:geti2p:i2p:0.9.42
-
cpe:2.3:a:geti2p:i2p:0.9.43
-
cpe:2.3:a:geti2p:i2p:0.9.44
-
cpe:2.3:a:geti2p:i2p:0.9.45
-
cpe:2.3:a:geti2p:i2p:0.9.5
-
cpe:2.3:a:geti2p:i2p:0.9.6
-
cpe:2.3:a:geti2p:i2p:0.9.7
-
cpe:2.3:a:geti2p:i2p:0.9.7.1
-
cpe:2.3:a:geti2p:i2p:0.9.8
-
cpe:2.3:a:geti2p:i2p:0.9.8.1
-
cpe:2.3:a:geti2p:i2p:0.9.9