{
  "version": "1",
  "package": [
    {
      "name": "seatd",
      "layer": "meta",
      "version": "0.8.0",
      "products": [
        {
          "product": "seatd",
          "cvesInRecord": "Yes"
        }
      ],
      "issue": [
        {
          "id": "CVE-2021-41387",
          "summary": "seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.",
          "scorev2": "8.5",
          "scorev3": "8.8",
          "scorev4": "0.0",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-41387"
        },
        {
          "id": "CVE-2022-25643",
          "summary": "seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.",
          "scorev2": "9.3",
          "scorev3": "9.8",
          "scorev4": "0.0",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2022-25643"
        }
      ]
    }
  ]
}