cvelist/2024/24xxx/CVE-2024-24964.json

68 lines
2.3 KiB
JSON
Raw Normal View History

2024-02-27 09:00:36 +00:00
{
2024-04-01 20:43:28 +00:00
"data_version": "4.0",
2024-02-27 09:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-24964",
2024-04-01 20:43:28 +00:00
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
2024-02-27 09:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-01 20:43:28 +00:00
"value": "Improper access control vulnerability exists in the resident process of SKYSEA Client View versions from Ver.11.220 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper access control"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Sky Co.,LTD.",
"product": {
"product_data": [
{
"product_name": "SKYSEA Client View",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "versions from Ver.11.220 prior to Ver.19.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.skyseaclientview.net/news/240307_01/",
"refsource": "MISC",
"name": "https://www.skyseaclientview.net/news/240307_01/"
},
{
"url": "https://jvn.jp/en/jp/JVN54451757/",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN54451757/"
2024-02-27 09:00:36 +00:00
}
]
}
}