Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-85wr-38f6-8hc9

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) stopserver.sh and (2) startserver.sh scripts in Adobe Version Cue on Mac OS X uses the current working directory to find and execute the productname.sh script, which allows local users to execute arbitrary code by copying and calling the scripts from a user-controlled directory.

The (1) stopserver.sh and (2) startserver.sh scripts in Adobe Version Cue on Mac OS X uses the current working directory to find and execute the productname.sh script, which allows local users to execute arbitrary code by copying and calling the scripts from a user-controlled directory.

EPSS

Процентиль: 71%
0.00669
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

The (1) stopserver.sh and (2) startserver.sh scripts in Adobe Version Cue on Mac OS X uses the current working directory to find and execute the productname.sh script, which allows local users to execute arbitrary code by copying and calling the scripts from a user-controlled directory.

EPSS

Процентиль: 71%
0.00669
Низкий