3 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in Caphyon Advanced Installer 19.7. This affects an unknown part of the component WinSxS DLL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. • https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability https://vuldb.com/?ctiid.240903 https://vuldb.com/?id.240903 https://www.advancedinstaller.com/release-19.7.1.html#bugfixes • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Privilege escalation in the MSI repair functionality in Caphyon Advanced Installer 20.0 and below allows attackers to access and manipulate system files. • https://www.advancedinstaller.com/release-20.1.html •

CVSS: 8.1EPSS: 9%CPEs: 99EXPL: 1

Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check. Caphyon Ltd Advanced Installer 19.3 y anteriores y muchos productos que utilizan el actualizador de Advanced Installer (Advanced Updater) están afectados por una vulnerabilidad de ejecución remota de código a través del parámetro CustomDetection en la función de comprobación de actualizaciones. Para explotar esta vulnerabilidad, un usuario debe iniciar una instalación afectada para activar la comprobación de la actualización • http://advanced.com http://caphyon.com https://gerr.re/posts/cve-2022-27438 https://www.advancedinstaller.com/security-updates-auto-updater.html • CWE-494: Download of Code Without Integrity Check •