An unquoted search path vulnerability exists inĪdobeUpdateService.exe that allows a local attacker to A local attacker canĮxploit this, via a specially crafted library (DLL)įile, to inject and execute arbitrary code in theĬontext of the current user. In the current working directory which may not be Installer due to looking for specific files or libraries An untrusted search path vulnerability exists in the "The version of Adobe Creative Cloud Desktop installed on the remote Script_set_attribute(attribute:"description", value: "An application installed on the remote host is affected by multiple Script_set_attribute(attribute:"synopsis", value: Script_summary(english:"Checks the version of Creative Cloud.") Script_name(english:"Adobe Creative Cloud Desktop < 3.7.0.272 Multiple Vulnerabilities (APSB16-21)") This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. This is the adobe_creative_cloud_3_7_0_272.nasl nessus plugin source code. Risk InformationĬVSS V2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C CVSS Base Score:ĬVSS V3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C CVSS Base Score: For more information, see how to use exploits safely. These exploits and PoCs could contain malware. WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. In any other case, this would be considered as an illegal activity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |