Filtered by vendor Adobe
Subscriptions
Filtered by product Illustrator
Subscriptions
Total
122 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-34138 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-08-15 | 5.5 Medium |
Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2006-0525 | 1 Adobe | 9 Acrobat, Acrobat Reader, Creative Suite and 6 more | 2024-08-07 | N/A |
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs. | ||||
CVE-2007-2365 | 1 Adobe | 4 Golive, Illustrator, Photoshop and 1 more | 2024-08-07 | N/A |
Buffer overflow in Adobe Photoshop CS2 and CS3, Photoshop Elements 5.0, Illustrator CS3, and GoLive 9 allows user-assisted remote attackers to execute arbitrary code via a crafted .PNG file. | ||||
CVE-2007-2244 | 1 Adobe | 3 Golive, Illustrator, Photoshop | 2024-08-07 | N/A |
Multiple buffer overflows in Adobe Photoshop CS2 and CS3, Illustrator CS3, and GoLive 9 allow user-assisted remote attackers to execute arbitrary code via a crafted (1) BMP, (2) DIB, or (3) RLE file. | ||||
CVE-2008-3961 | 1 Adobe | 1 Illustrator | 2024-08-07 | N/A |
Multiple unspecified vulnerabilities in Adobe Illustrator CS2 on Macintosh allow user-assisted attackers to execute arbitrary code via a crafted AI file. | ||||
CVE-2009-4195 | 1 Adobe | 1 Illustrator | 2024-08-07 | N/A |
Buffer overflow in Adobe Illustrator CS4 14.0.0, CS3 13.0.3 and earlier, and CS3 13.0.0 allows remote attackers to execute arbitrary code via a long DSC comment in an Encapsulated PostScript (.eps) file. NOTE: some of these details are obtained from third party information. | ||||
CVE-2010-3152 | 1 Adobe | 1 Illustrator | 2024-08-07 | N/A |
Untrusted search path vulnerability in Adobe Illustrator CS4 14.0.0, CS5 15.0.1 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires.dll that is located in the same folder as an .ait or .eps file. | ||||
CVE-2012-2025 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, and CVE-2012-2026. | ||||
CVE-2012-2026 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, and CVE-2012-2025. | ||||
CVE-2012-2024 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2012-2042 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2012-2023 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2012-0780 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2014-0513 | 1 Adobe | 1 Illustrator | 2024-08-06 | N/A |
Stack-based buffer overflow in Adobe Illustrator CS6 before 16.0.5 and 16.2.x before 16.2.2 allows remote attackers to execute arbitrary code via unspecified vectors. | ||||
CVE-2020-9640 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9639 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9642 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9641 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9570 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9573 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. |