Show plain JSON{"containers": {"cna": {"affected": [{"product": "McAfee TechCheck", "vendor": "McAfee, LLC", "versions": [{"lessThan": "prior to 3.0.0.17", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "descriptions": [{"lang": "en", "value": "DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "DLL Search Order Hijacking vulnerability", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2019-12-11T06:25:17", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102996"}], "source": {"discovery": "EXTERNAL"}, "title": "DLL Search Order Hijacking", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2019-3667", "STATE": "PUBLIC", "TITLE": "DLL Search Order Hijacking"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "McAfee TechCheck", "version": {"version_data": [{"version_affected": "<", "version_value": "prior to 3.0.0.17"}]}}]}, "vendor_name": "McAfee, LLC"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "DLL Search Order Hijacking vulnerability"}]}]}, "references": {"reference_data": [{"name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102996", "refsource": "CONFIRM", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102996"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T19:12:09.661Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102996"}]}]}, "cveMetadata": {"assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2019-3667", "datePublished": "2019-12-11T06:25:17", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:12:09.661Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}