CA eHealth Performance Manager up to and including 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ca ehealth performance manager |