Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-34235— Adobe Premiere Elements Uncontrolled Search Path Element Privilege Escalation

CVSS 7.8 · High EPSS 0.15% · P36
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-34235

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Adobe Premiere Elements Uncontrolled Search Path Element Privilege Escalation
Source: NVD (National Vulnerability Database)
Vulnerability Description
Adobe Premiere Elements version 2020v20 (and earlier) is affected by an Uncontrolled Search Path Element which could lead to Privilege Escalation. An attacker could leverage this vulnerability to obtain admin using an existing low-privileged user. Exploitation of this issue does not require user interaction.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对搜索路径元素未加控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Adobe Premiere Elements 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Adobe Premiere Elements是美国Adobe公司的一个视频编辑软件应用程序。它是Adobe Premiere Pro的缩小版本,专为新手编辑和消费者量身定制。 Adobe Premiere Elements 20.0版本存在代码问题漏洞,该漏洞源于受到攻击可导致权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AdobePremiere Elements unspecified ~ 2020v20 -

II. Public POCs for CVE-2022-34235

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-34235

登录查看更多情报信息。

Same Patch Batch · Adobe · 2022-08-11 · 18 CVEs total

CVE-2022-356777.8 HIGHAdobe FrameMaker SVG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnera
CVE-2022-356767.8 HIGHAdobe FrameMaker SVG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnera
CVE-2022-356667.8 HIGHAdobe Acrobat Reader Improper Input Validation Remote Code Execution Vulnerability
CVE-2022-356677.8 HIGHAdobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerabil
CVE-2022-356657.8 HIGHAdobe Acrobat Reader Use-After-Free Arbitrary Code Execution
CVE-2022-356737.8 HIGHAdobe FrameMaker SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
CVE-2022-356747.8 HIGHAdobe FrameMaker SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
CVE-2022-356757.8 HIGHAdobe FrameMaker SVG File Parsing Use-After-Free Remote Code Execution Vulnerability
CVE-2022-356705.5 MEDIUMAdobe Acrobat Reader Use-After-Free Memory leak
CVE-2022-356785.5 MEDIUMAdobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerabili
CVE-2022-356685.5 MEDIUMAdobe Acrobat Reader Improper Input Validation Memory leak
CVE-2022-356715.5 MEDIUMAdobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerabili
CVE-2022-342625.5 MEDIUMAdobe Illustrator Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
CVE-2022-342615.5 MEDIUMAdobe Illustrator Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
CVE-2022-342645.5 MEDIUMAdobe FrameMaker Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
CVE-2022-34263Adobe Illustrator Font Parsing Use-After-Free Remote Code Execution Vulnerability
CVE-2022-34260Adobe Illustrator Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2022-34235

No comments yet


Leave a comment