User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.Īdobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required before product installation to abuse this vulnerability.Īdobe InCopy version 16.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability on the product installer. An unauthenticated attacker could leverage this vulnerability to remove files and escalate privileges under the context of SYSTEM. 4MOSAn GCB Doctor’s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files.Īdobe - creative_cloud_desktop_applicationĪdobe Creative Cloud version 5.5 (and earlier) are affected by a privilege escalation vulnerability in the resources leveraged by the Setup.exe service.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |