Vulnerabilities in Mint Workbench allow a low-privileged attacker to create and write to a file anywhere on the file system as “system” with arbitrary content when the file does not already exist. 3.2.5 IMPROPER PRIVILEGE MANAGEMENT CWE-269 A CVSS v3 base score of 7.3 has been calculated the CVSS vector string is ( AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). 3.2.4 IMPROPER PRIVILEGE MANAGEMENT CWE-269ĬVE-2022-31219 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated the CVSS vector string is ( AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The Drive Composer installer file allows a low-privileged user to run a “repair” operation on the product.ĬVE-2022-31218 has been assigned to this vulnerability. Vulnerabilities in Drive Composer allow a low privileged user to create and write to a file anywhere on the file system as “system” with arbitrary content when the file does not already exist. 3.2.3 IMPROPER PRIVILEGE MANAGEMENT CWE-269 3.2.2 IMPROPER PRIVILEGE MANAGEMENT CWE-269ĬVE-2022-31217 has been assigned to this vulnerability. The Drive Composer installer file allows a low-privileged user to run a “repair” operation on the product.ĬVE-2022-31216 has been assigned to this vulnerability. Vulnerabilities in Drive Composer allow a low-privileged user to create and write to a file anywhere on the file system as “system” with arbitrary content when the file does not already exist.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |