mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
72 lines
2.4 KiB
JSON
72 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2021-31776",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Aviatrix VPN Client before 2.14.14 on Windows has an unquoted search path that enables local privilege escalation to the SYSTEM user, if the machine is misconfigured to allow unprivileged users to write to directories that are supposed to be restricted to administrators."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://docs.aviatrix.com/Downloads/samlclient.html",
|
|
"refsource": "MISC",
|
|
"name": "https://docs.aviatrix.com/Downloads/samlclient.html"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog",
|
|
"url": "https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://docs.aviatrix.com/Downloads/samlclient.html#windows-win",
|
|
"url": "https://docs.aviatrix.com/Downloads/samlclient.html#windows-win"
|
|
}
|
|
]
|
|
}
|
|
} |