{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:09:43.644","vulnerabilities":[{"cve":{"id":"CVE-2022-38351","sourceIdentifier":"cve@mitre.org","published":"2022-09-19T21:15:09.627","lastModified":"2025-05-29T16:15:28.527","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Suprema BioStar (aka Bio Star) 2 v2.8.16 allows attackers to escalate privileges to System Administrator via a crafted PUT request to the update profile page."},{"lang":"es","value":"Una vulnerabilidad en Suprema BioStar (también conocido como Bio Star) 2 v2.8.16 permite a los atacantes escalar privilegios al administrador del sistema a través de una solicitud PUT elaborada a la página de perfil de actualización"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:supremainc:biostar_2:2.8.16:*:*:*:*:*:*:*","matchCriteriaId":"F2B12F1E-F008-4D04-974B-C26AC67005AE"}]}]}],"references":[{"url":"https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://nobugescapes.com/wp-content/uploads/2022/08/Part1.docx","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://nobugescapes.com/wp-content/uploads/2022/08/Part1.docx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}