Vulnerabilities (CVE)

Filtered by vendor Adobe Subscribe
Total 5890 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-20739 3 Adobe, Apple, Microsoft 3 Audition, Macos, Windows 2024-12-06 N/A 7.8 HIGH
Audition versions 24.0.3, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20750 1 Adobe 1 Substance 3d Designer 2024-12-06 N/A 7.8 HIGH
Substance3D - Designer versions 13.1.0 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20792 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-12-05 N/A 7.8 HIGH
Illustrator versions 28.4, 27.9.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20793 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
Illustrator versions 28.4, 27.9.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20770 3 Adobe, Apple, Microsoft 3 Photoshop, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
Photoshop Desktop versions 24.7.2, 25.3.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20766 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
InDesign Desktop versions 18.5.1, 19.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20737 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
After Effects versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20772 3 Adobe, Apple, Microsoft 3 Media Encoder, Macos, Windows 2024-12-05 N/A 7.8 HIGH
Media Encoder versions 24.2.1, 23.6.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20771 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
Bridge versions 13.0.6, 14.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20798 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20794 3 Adobe, Apple, Microsoft 3 Animate, Macos, Windows 2024-12-05 N/A 5.5 MEDIUM
Animate versions 23.0.4, 24.0.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service. An attacker could leverage this vulnerability to cause a system crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20791 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-12-04 N/A 7.8 HIGH
Illustrator versions 28.4, 27.9.3 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20767 1 Adobe 1 Coldfusion 2024-12-04 N/A 8.2 HIGH
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
CVE-2024-20745 3 Adobe, Apple, Microsoft 3 Premiere Pro, Macos, Windows 2024-12-04 N/A 7.8 HIGH
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20746 3 Adobe, Apple, Microsoft 3 Premiere Pro, Macos, Windows 2024-12-04 N/A 7.8 HIGH
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20752 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2024-12-04 N/A 7.8 HIGH
Bridge versions 13.0.5, 14.0.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20755 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2024-12-04 N/A 7.8 HIGH
Bridge versions 13.0.5, 14.0.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20756 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2024-12-04 N/A 7.8 HIGH
Bridge versions 13.0.5, 14.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20757 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2024-12-04 N/A 5.5 MEDIUM
Bridge versions 13.0.5, 14.0.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-20754 2 Adobe, Apple 2 Lightroom, Macos 2024-12-04 N/A 7.5 HIGH
Lightroom Desktop versions 7.1.2 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file.