Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-36047

Опубликовано: 01 сент. 2021
Источник: debian
EPSS Низкий

Описание

XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
exempifixed2.6.0-1package

Примечания

  • https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html

  • https://cgit.freedesktop.org/exempi/commit/?h=2.6.0&id=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48

  • https://gitlab.freedesktop.org/libopenraw/exempi/-/releases

EPSS

Процентиль: 67%
0.00545
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
nvd
больше 4 лет назад

XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
github
больше 3 лет назад

XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость программного обеспечения создания метаданных, обработки и обмена набором стандартов Adobe XMP-Toolkit-SDK, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 67%
0.00545
Низкий