Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe photoshop 8.0 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2009-3489
Adobe Photoshop Elements 8.0 installs the Adobe Active File Monitor V8 service with an insecure security descriptor, which allows local users to (1) stop the service via the stop command, (2) execute arbitrary commands as SYSTEM by using the config command to modify the binPath v...
Adobe Photoshop Elements 8.0
2 EDB exploits
NA
CVE-2012-2027
Use-after-free vulnerability in Adobe Photoshop CS5 12.x prior to 12.0.5 and CS5.1 12.1.x prior to 12.1.1 allows remote malicious users to execute arbitrary code via a crafted TIFF (aka .TIF) file.
Adobe Photoshop Cs4 11.0
Adobe Photoshop 7.0
Adobe Photoshop 6.0
Adobe Photoshop 12.0.3
Adobe Photoshop 12.0.2
Adobe Photoshop 11.0
Adobe Photoshop 10.0.1
Adobe Photoshop 8.0
Adobe Photoshop 7.0.1
Adobe Photoshop 2.5
Adobe Photoshop 12.0.4
Adobe Photoshop 11.0.2
Adobe Photoshop 11.0.1
Adobe Photoshop Cs5.5
Adobe Photoshop 9.0.2
Adobe Photoshop 6.0.1
Adobe Photoshop 5.0
Adobe Photoshop 12.0.1
Adobe Photoshop 12.0.0
Adobe Photoshop 10.0
Adobe Photoshop
Adobe Photoshop 9.0.1
1 EDB exploit
NA
CVE-2012-2028
Buffer overflow in Adobe Photoshop CS5 12.x prior to 12.0.5 and CS5.1 12.1.x prior to 12.1.1 allows remote malicious users to execute arbitrary code via unspecified vectors.
Adobe Photoshop 9.0.1
Adobe Photoshop 9.0
Adobe Photoshop 5.0
Adobe Photoshop 4.0
Adobe Photoshop 11.0
Adobe Photoshop 11.0.4
Adobe Photoshop Cs5.5
Adobe Photoshop 9.0.2
Adobe Photoshop 6.0.1
Adobe Photoshop 6.0
Adobe Photoshop 12.0.1
Adobe Photoshop 12.0.0
Adobe Photoshop 10.0
Adobe Photoshop
Adobe Photoshop 8.0
Adobe Photoshop 7.0.1
Adobe Photoshop 3.0
Adobe Photoshop 2.5
Adobe Photoshop 11.0.2
Adobe Photoshop 11.0.1
Adobe Photoshop Cs4 11.0
Adobe Photoshop 7.0
NA
CVE-2011-2443
Multiple buffer overflows in Adobe Photoshop Elements 8.0 and previous versions allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted (1) .grd or (2) .abr file, a related issue to CVE-2...
Adobe Photoshop Elements 5.0
Adobe Photoshop Elements
Adobe Photoshop Elements 7.0
1 EDB exploit
NA
CVE-2011-2164
Multiple unspecified vulnerabilities in Adobe Photoshop prior to 12.0.4 have unknown impact and attack vectors.
Adobe Photoshop 9.0.2
Adobe Photoshop 7.0
Adobe Photoshop 9.0
Adobe Photoshop 12.0.0
Adobe Photoshop 8.0
Adobe Photoshop 12.0.1
Adobe Photoshop 11.0.2
Adobe Photoshop
Adobe Photoshop 11.0.4
Adobe Photoshop 11.0.1
Adobe Photoshop 10.0
Adobe Photoshop 10.0.1
Adobe Photoshop 9.0.1
Adobe Photoshop 12.0.2
Adobe Photoshop 11.0
NA
CVE-2006-0525
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
Adobe Acrobat 4.0.5
Adobe Acrobat 4.0.5a
Adobe Acrobat 6.0.2
Adobe Acrobat 6.0.3
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 4.0.5
Adobe Acrobat Reader 6.0
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 7.0.3
Adobe Creative Suite 1.0
Adobe Illustrator Cs
Adobe Illustrator Cs3
Adobe Photoshop 8.0
Adobe Photoshop 9.0.2
Adobe Acrobat 5.0.10
Adobe Acrobat 5.0.5
Adobe Acrobat 7.0.1
Adobe Acrobat 7.0.2
Adobe Acrobat Reader 4.5
Adobe Acrobat Reader 5.0
Adobe Acrobat Reader 5.0.10
Adobe Acrobat Reader 6.0.4
NA
CVE-2005-0151
Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows malicious users to gain administrator privileges.
Adobe Creative Suite 1.0
Adobe Photoshop 8.0
Adobe Premiere 1.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started