cvelist/2022/38xxx/CVE-2022-38176.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2022-08-12 14:43:37 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-09-06 21:00:36 +00:00
"ID": "CVE-2022-38176",
"STATE": "PUBLIC"
2022-08-12 14:43:37 +00:00
},
2022-09-06 21:00:36 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-08-12 14:43:37 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-09-06 21:00:36 +00:00
"value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://ysoft.com",
"refsource": "MISC",
"name": "https://ysoft.com"
},
{
"refsource": "MISC",
"name": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation",
"url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"
2022-08-12 14:43:37 +00:00
}
]
}
}