cvelist/2018/9xxx/CVE-2018-9859.json

62 lines
1.8 KiB
JSON
Raw Normal View History

2018-04-09 11:02:19 -04:00
{
2019-03-17 22:24:59 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-9859",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-06-15 17:04:21 -04:00
{
2019-03-17 22:24:59 +00:00
"lang": "eng",
"value": "The path of Whale update service was unquoted in NAVER Whale before 1.0.40.7. This vulnerability can be used for persistent privilege escalation if it's available to create an executable file with System privilege by other vulnerable applications."
2018-06-15 17:04:21 -04:00
}
2019-03-17 22:24:59 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cve.naver.com/detail/cve-2018-9859.html",
"refsource": "CONFIRM",
"url": "https://cve.naver.com/detail/cve-2018-9859.html"
}
]
}
}