Adobe FrameMaker Publishing Server 2020 Update 2

CPE Details

Adobe FrameMaker Publishing Server 2020 Update 2
2020
2024-03-05
19h01 +00:00
2024-03-05
19h01 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:adobe:framemaker_publishing_server:2020:update2:*:*:*:*:*:*

Informations

Vendor

adobe

Product

framemaker_publishing_server

Version

2020

Update

update2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-30300 2024-06-13 11h24 +00:00 Adobe Framemaker Publishing Server versions 2020.3, 2022.2 and earlier are affected by an Information Exposure vulnerability (CWE-200) that could lead to privilege escalation. An attacker could exploit this vulnerability to gain access to sensitive information which may include system or user privileges. Exploitation of this issue does not require user interaction.
9.8
Critique
CVE-2024-30299 2024-06-13 11h24 +00:00 Adobe Framemaker Publishing Server versions 2020.3, 2022.2 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction.
10
Critique
CVE-2024-20738 2024-02-15 12h22 +00:00 Adobe FrameMaker Publishing Server versions 2022.1 and earlier are affected by an Improper Authentication vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass authentication mechanisms and gain unauthorized access. Exploitation of this issue does not require user interaction.
9.8
Critique
CVE-2023-44324 2023-11-17 12h27 +00:00 Adobe FrameMaker Publishing Server versions 2022 and earlier are affected by an Improper Authentication vulnerability that could result in a Security feature bypass. An unauthenticated attacker can abuse this vulnerability to access the API and leak default admin's password. Exploitation of this issue does not require user interaction.
9.8
Critique