cvelist/2021/31xxx/CVE-2021-31776.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2021-04-23 20:00:45 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-04-29 01:00:51 +00:00
"ID": "CVE-2021-31776",
"STATE": "PUBLIC"
2021-04-23 20:00:45 +00:00
},
2021-04-29 01:00:51 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-04-23 20:00:45 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-04-29 01:00:51 +00:00
"value": "Aviatrix VPN Client before 2.14.14 on Windows has an unquoted search path that enables local privilege escalation to the SYSTEM user, if the machine is misconfigured to allow unprivileged users to write to directories that are supposed to be restricted to administrators."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.aviatrix.com/Downloads/samlclient.html",
"refsource": "MISC",
"name": "https://docs.aviatrix.com/Downloads/samlclient.html"
},
{
"refsource": "CONFIRM",
"name": "https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog",
"url": "https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog"
},
{
"refsource": "MISC",
"name": "https://docs.aviatrix.com/Downloads/samlclient.html#windows-win",
"url": "https://docs.aviatrix.com/Downloads/samlclient.html#windows-win"
2021-04-23 20:00:45 +00:00
}
]
}
}