← Retour aux CVEs
CVE-2016-7063
CRITICAL9.8
Description
A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie7/21/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
pritunl:pritunl-client
Faiblesses (CWE)
CWE-22CWE-22
References
https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6(secalert@redhat.com)
https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6%2C(secalert@redhat.com)
https://lf.lc/CVE-2016-7063.txt(secalert@redhat.com)
https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6%2C(af854a3a-2127-422b-91ae-364da2661108)
https://lf.lc/CVE-2016-7063.txt(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.