2 results (0.001 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Hola 1.79.859. An unprivileged user could modify or overwrite the executable with arbitrary code, which would be executed the next time the service is started. Depending on the user that the service runs as, this could result in privilege escalation. The issue exists because of the SERVICE_ALL_ACCESS access right for the hola_svc and hola_updater services. Se ha descubierto un problema en Hola 1.79.859. • http://seclists.org/fulldisclosure/2018/Mar/23 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Hola VPN 1.34 has weak permissions (Everyone:F) under %PROGRAMFILES%, which allows local users to gain privileges via a Trojan horse 7za.exe or hola.exe file. Hola VPN 1.34 tiene permisos débiles (Everyone:F) bajo %PROGRAMFILES%, lo que permite que los usuarios locales obtengan privilegios mediante un archivo troyano 7za.exe u hola.exe. • http://www.securityfocus.com/bid/101787 https://www.vulnerability-lab.com/get_content.php?id=2062 • CWE-732: Incorrect Permission Assignment for Critical Resource •