CVE-2019-6008
26.12.2019, 16:15
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.Enginsight
Vendor | Product | Version |
---|---|---|
yokogawa | exaopc | r1.01.00 ≤ 𝑥 ≤ r3.77.00 |
yokogawa | exaplog | r1.10.00 ≤ 𝑥 ≤ r3.30.00 |
yokogawa | exaquantum | r1.10.00 ≤ 𝑥 ≤ r3.02.00 |
yokogawa | exaquantum\/batch | r1.01.00 ≤ 𝑥 ≤ r2.50.40 |
yokogawa | exarqe | * |
yokogawa | exasmoc | * |
yokogawa | ga10 | r1.01.01 ≤ 𝑥 ≤ r3.05.01 |
yokogawa | insightsuiteae | r1.01.00 ≤ 𝑥 ≤ r1.06.00 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration