Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 14 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:adobe:format_plugins:-:*:*:*:*:*:*:* |
Wed, 12 Nov 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adobe
Adobe format Plugins |
|
| Vendors & Products |
Adobe
Adobe format Plugins |
Tue, 11 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Format Plugins versions 1.1.1 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |
| Title | Format Plugins | Out-of-bounds Read (CWE-125) | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-11-14T15:27:12.184Z
Reserved: 2025-10-01T17:52:06.981Z
Link: CVE-2025-61839
Updated: 2025-11-12T14:22:33.502Z
Status : Analyzed
Published: 2025-11-11T19:15:35.607
Modified: 2025-11-13T15:19:50.140
Link: CVE-2025-61839
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:36:43Z