Filtered by vendor Adobe
Subscriptions
Filtered by product Illustrator
Subscriptions
Total
113 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2012-2024 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2012-2042 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2012-2023 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2012-0780 | 1 Adobe | 2 Illustrator, Illustrator Cs5.5 | 2024-08-06 | N/A |
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | ||||
CVE-2014-0513 | 1 Adobe | 1 Illustrator | 2024-08-06 | N/A |
Stack-based buffer overflow in Adobe Illustrator CS6 before 16.0.5 and 16.2.x before 16.2.2 allows remote attackers to execute arbitrary code via unspecified vectors. | ||||
CVE-2020-9640 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9639 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9642 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9641 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9570 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9573 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-9572 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-9574 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2020-9571 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-9575 | 2 Adobe, Microsoft | 2 Illustrator, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
CVE-2022-30644 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-08-03 | 7.8 High |
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2022-30637 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-08-03 | 7.8 High |
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2022-30645 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-08-03 | 7.8 High |
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2022-30641 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-08-03 | 7.8 High |
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2022-30643 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-08-03 | 7.8 High |
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |