An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ysoft
Ysoft safeq |
|
CPEs | cpe:2.3:a:ysoft:safeq:6.0:-:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build32:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build33:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build34:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build35:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build36:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build37:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build38:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build39:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build40:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build41:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build42:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build43:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build44:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build45:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build46:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build47:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build48:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build49:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build50:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build51:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build52:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build54:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build55:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build56:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build57:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build58:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build59:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build60:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build61:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build62:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build63:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build64:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build65:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build66:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build67:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build68:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build69:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build70:*:*:*:*:*:* cpe:2.3:a:ysoft:safeq:6.0:build71:*:*:*:*:*:* |
|
Vendors & Products |
Ysoft
Ysoft safeq |
Wed, 30 Oct 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Ysoft
Ysoft safeq |
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-09-06T20:32:12
Updated: 2024-08-03T10:45:52.959Z
Reserved: 2022-08-12T00:00:00
Link: CVE-2022-38176
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-09-06T21:15:08.967
Modified: 2024-11-21T07:15:56.433
Link: CVE-2022-38176
Redhat
No data.