CVE-2018-17775

Seqrite End Point Security v7.4 has "Everyone: (F)" permission for %PROGRAMFILES%\Seqrite\Seqrite, which allows local users to gain privileges by replacing an executable file with a Trojan horse.
Configurations

Configuration 1 (hide)

cpe:2.3:a:seqrite:end_point_security:7.4:*:*:*:*:*:*:*

History

21 Nov 2024, 03:54

Type Values Removed Values Added
References () https://packetstormsecurity.com/files/149586/Seqrite-End-Point-Security-7.4-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/149586/Seqrite-End-Point-Security-7.4-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/45568/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45568/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-10-08 17:29

Updated : 2024-11-21 03:54


NVD link : CVE-2018-17775

Mitre link : CVE-2018-17775

CVE.ORG link : CVE-2018-17775


JSON object : View

Products Affected

seqrite

  • end_point_security
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource