Vulnerabilities (CVE)

Filtered by vendor Adobe Subscribe
Filtered by product Illustrator Cc
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-3714 2 Adobe, Microsoft 2 Illustrator Cc, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-3713 2 Adobe, Microsoft 2 Illustrator Cc, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-3712 2 Adobe, Microsoft 2 Illustrator Cc, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-3711 2 Adobe, Microsoft 2 Illustrator Cc, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-3710 2 Adobe, Microsoft 2 Illustrator Cc, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-8248 3 Adobe, Apple, Microsoft 3 Illustrator Cc, Macos, Windows 2024-11-21 10.0 HIGH 9.8 CRITICAL
Adobe Illustrator CC versions 23.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8247 3 Adobe, Apple, Microsoft 3 Illustrator Cc, Macos, Windows 2024-11-21 10.0 HIGH 9.8 CRITICAL
Adobe Illustrator CC versions 23.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7962 3 Adobe, Apple, Microsoft 3 Illustrator Cc, Macos, Windows 2024-11-21 4.4 MEDIUM 7.8 HIGH
Adobe Illustrator CC versions 23.1 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.