Total
22 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-9669 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Adobe Creative Cloud Desktop Application versions 5.1 and earlier have a lack of exploit mitigations vulnerability. Successful exploitation could lead to privilege escalation. | |||||
CVE-2020-3808 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 5.8 MEDIUM | 5.9 MEDIUM |
Creative Cloud Desktop Application versions 5.0 and earlier have a time-of-check to time-of-use (toctou) race condition vulnerability. Successful exploitation could lead to arbitrary file deletion. | |||||
CVE-2020-24422 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 6.8 MEDIUM | 7.0 HIGH |
Adobe Creative Cloud Desktop Application version 5.2 (and earlier) and 2.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2019-8236 | 3 Adobe, Apple, Microsoft | 3 Creative Cloud, Macos, Windows | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Creative Cloud Desktop Application version 4.6.1 and earlier versions have Security Bypass vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user. | |||||
CVE-2019-8063 | 3 Adobe, Apple, Microsoft | 3 Creative Cloud, Mac Os X, Windows | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Creative Cloud Desktop Application 4.6.1 and earlier versions have an insecure transmission of sensitive data vulnerability. Successful exploitation could lead to information leakage. | |||||
CVE-2019-7959 | 3 Adobe, Apple, Microsoft | 3 Creative Cloud, Mac Os X, Windows | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
Creative Cloud Desktop Application versions 4.6.1 and earlier have a using components with known vulnerabilities vulnerability. Successful exploitation could lead to arbitrary code execution. | |||||
CVE-2019-7958 | 3 Adobe, Apple, Microsoft | 3 Creative Cloud, Mac Os X, Windows | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
Creative Cloud Desktop Application versions 4.6.1 and earlier have an insecure inherited permissions vulnerability. Successful exploitation could lead to privilege escalation. | |||||
CVE-2019-7957 | 3 Adobe, Apple, Microsoft | 3 Creative Cloud, Mac Os X, Windows | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Creative Cloud Desktop Application versions 4.6.1 and earlier have a security bypass vulnerability. Successful exploitation could lead to denial of service. | |||||
CVE-2019-7093 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Creative Cloud Desktop Application (installer) versions 4.7.0.400 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation. | |||||
CVE-2018-5003 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Adobe Creative Cloud Desktop Application before 4.5.5.342 (installer) has an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation. | |||||
CVE-2018-4992 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper input validation vulnerability. Successful exploitation could lead to local privilege escalation. | |||||
CVE-2018-4991 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper certificate validation vulnerability. Successful exploitation could lead to a security bypass. | |||||
CVE-2018-4873 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Unquoted Search Path vulnerability. Successful exploitation could lead to local privilege escalation. | |||||
CVE-2018-12829 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Adobe Creative Cloud Desktop Application before 4.6.1 has an improper certificate validation vulnerability. Successful exploitation could lead to privilege escalation. | |||||
CVE-2017-3007 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Adobe Thor versions 3.9.5.353 and earlier have a vulnerability in the directory search path used to find resources, related to Creative Cloud desktop applications. | |||||
CVE-2017-3006 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
Adobe Thor versions 3.9.5.353 and earlier have a vulnerability related to the use of improper resource permissions during the installation of Creative Cloud desktop applications. | |||||
CVE-2016-6935 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Unquoted Windows search path vulnerability in Adobe Creative Cloud Desktop Application before 3.8.0.310 on Windows allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory. | |||||
CVE-2016-4158 | 2 Adobe, Microsoft | 2 Creative Cloud, Windows | 2024-11-21 | 6.9 MEDIUM | 7.3 HIGH |
Unquoted Windows search path vulnerability in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory. | |||||
CVE-2016-4157 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 6.9 MEDIUM | 7.3 HIGH |
Untrusted search path vulnerability in the installer in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse resource in an unspecified directory. | |||||
CVE-2016-1034 | 1 Adobe | 1 Creative Cloud | 2024-11-21 | 9.4 HIGH | 9.1 CRITICAL |
The Sync Process in the JavaScript API for Creative Cloud Libraries in Adobe Creative Cloud Desktop Application before 3.6.0.244 allows remote attackers to read or write to arbitrary files via unspecified vectors. |