GHSA-2GJ6-4M7M-3C82
Vulnerability from github – Published: 2022-06-15 00:00 – Updated: 2022-06-28 00:00
VLAI?
Details
Incomplete filtering of special elements vulnerability exists in RevoWorks SCVX using 'File Sanitization Library' 1.043 and prior versions, RevoWorks Browser 2.2.67 and prior versions (when using 'File Sanitization Option'), and RevoWorks Desktop 2.1.84 and prior versions (when using 'File Sanitization Option'), which may allow an attacker to execute a malicious macro by having a user to download, import, and open a specially crafted file in the local environment.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2022-27176"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-06-14T09:15:00Z",
"severity": "HIGH"
},
"details": "Incomplete filtering of special elements vulnerability exists in RevoWorks SCVX using \u0027File Sanitization Library\u0027 1.043 and prior versions, RevoWorks Browser 2.2.67 and prior versions (when using \u0027File Sanitization Option\u0027), and RevoWorks Desktop 2.1.84 and prior versions (when using \u0027File Sanitization Option\u0027), which may allow an attacker to execute a malicious macro by having a user to download, import, and open a specially crafted file in the local environment.",
"id": "GHSA-2gj6-4m7m-3c82",
"modified": "2022-06-28T00:00:55Z",
"published": "2022-06-15T00:00:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27176"
},
{
"type": "WEB",
"url": "https://jscom.jp/news-20220527"
},
{
"type": "WEB",
"url": "https://jvn.jp/en/jp/JVN27256219/index.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…