Vulnerabilities (CVE)

Filtered by vendor Adobe Subscribe
Filtered by product Illustrator
Total 113 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-0780 1 Adobe 2 Illustrator, Illustrator Cs5.5 2024-02-28 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026.
CVE-2012-2024 1 Adobe 2 Illustrator, Illustrator Cs5.5 2024-02-28 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2025, and CVE-2012-2026.
CVE-2012-2042 1 Adobe 2 Illustrator, Illustrator Cs5.5 2024-02-28 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026.
CVE-2012-2023 1 Adobe 2 Illustrator, Illustrator Cs5.5 2024-02-28 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026.
CVE-2012-2026 1 Adobe 2 Illustrator, Illustrator Cs5.5 2024-02-28 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, and CVE-2012-2025.
CVE-2012-2025 1 Adobe 2 Illustrator, Illustrator Cs5.5 2024-02-28 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, and CVE-2012-2026.
CVE-2010-3152 1 Adobe 1 Illustrator 2024-02-28 9.3 HIGH N/A
Untrusted search path vulnerability in Adobe Illustrator CS4 14.0.0, CS5 15.0.1 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires.dll that is located in the same folder as an .ait or .eps file.
CVE-2009-3952 1 Adobe 1 Illustrator 2024-02-28 10.0 HIGH N/A
Buffer overflow in Adobe Illustrator CS3 13.0.3 and earlier and Illustrator CS4 14.0.0 allows attackers to execute arbitrary code via unspecified vectors.
CVE-2009-4195 1 Adobe 1 Illustrator 2024-02-28 9.3 HIGH N/A
Buffer overflow in Adobe Illustrator CS4 14.0.0, CS3 13.0.3 and earlier, and CS3 13.0.0 allows remote attackers to execute arbitrary code via a long DSC comment in an Encapsulated PostScript (.eps) file. NOTE: some of these details are obtained from third party information.
CVE-2008-3961 1 Adobe 1 Illustrator 2024-02-28 9.3 HIGH N/A
Multiple unspecified vulnerabilities in Adobe Illustrator CS2 on Macintosh allow user-assisted attackers to execute arbitrary code via a crafted AI file.
CVE-2007-2244 1 Adobe 3 Golive, Illustrator, Photoshop 2024-02-28 9.3 HIGH N/A
Multiple buffer overflows in Adobe Photoshop CS2 and CS3, Illustrator CS3, and GoLive 9 allow user-assisted remote attackers to execute arbitrary code via a crafted (1) BMP, (2) DIB, or (3) RLE file.
CVE-2007-2365 1 Adobe 4 Golive, Illustrator, Photoshop and 1 more 2024-02-28 9.3 HIGH N/A
Buffer overflow in Adobe Photoshop CS2 and CS3, Photoshop Elements 5.0, Illustrator CS3, and GoLive 9 allows user-assisted remote attackers to execute arbitrary code via a crafted .PNG file.
CVE-2006-0525 1 Adobe 9 Acrobat, Acrobat Reader, Creative Suite and 6 more 2024-02-28 4.6 MEDIUM N/A
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.