Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe photoshop 9.0.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3127
Untrusted search path vulnerability in Adobe PhotoShop CS2 through CS5 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or Wintab32.dll that is located in the same folder as a PSD or other...
Adobe Photoshop 11.0
Adobe Photoshop 9.0
Adobe Photoshop 9.0.2
Adobe Photoshop 10.0
Adobe Photoshop 12.0
Adobe Photoshop 9.0.1
1 EDB exploit
NA
CVE-2007-2365
Buffer overflow in Adobe Photoshop CS2 and CS3, Photoshop Elements 5.0, Illustrator CS3, and GoLive 9 allows user-assisted remote malicious users to execute arbitrary code via a crafted .PNG file.
Adobe Photoshop 9.0.2
Adobe Golive 9
Adobe Photoshop Elements 5.0
Adobe Illustrator Cs3
1 EDB exploit
NA
CVE-2011-2164
Multiple unspecified vulnerabilities in Adobe Photoshop prior to 12.0.4 have unknown impact and attack vectors.
Adobe Photoshop 11.0
Adobe Photoshop 11.0.4
Adobe Photoshop 12.0.2
Adobe Photoshop 11.0.2
Adobe Photoshop 9.0
Adobe Photoshop 10.0.1
Adobe Photoshop 8.0
Adobe Photoshop 9.0.2
Adobe Photoshop 10.0
Adobe Photoshop 9.0.1
Adobe Photoshop 7.0
Adobe Photoshop
Adobe Photoshop 11.0.1
Adobe Photoshop 12.0.1
Adobe Photoshop 12.0.0
NA
CVE-2007-2244
Multiple buffer overflows in Adobe Photoshop CS2 and CS3, Illustrator CS3, and GoLive 9 allow user-assisted remote malicious users to execute arbitrary code via a crafted (1) BMP, (2) DIB, or (3) RLE file.
Adobe Photoshop 9.0.2
Adobe Golive 9
Adobe Illustrator Cs3
1 EDB exploit
NA
CVE-2012-2028
Buffer overflow in Adobe Photoshop CS5 12.x prior to 12.0.5 and CS5.1 12.1.x prior to 12.1.1 allows remote malicious users to execute arbitrary code via unspecified vectors.
Adobe Photoshop 2.5
Adobe Photoshop 11.0
Adobe Photoshop 11.0.4
Adobe Photoshop Cs5.5
Adobe Photoshop 12.0.2
Adobe Photoshop 11.0.2
Adobe Photoshop
Adobe Photoshop 6.0.1
Adobe Photoshop 9.0
Adobe Photoshop 6.0
Adobe Photoshop 10.0.1
Adobe Photoshop 8.0
Adobe Photoshop 7.0.1
Adobe Photoshop 9.0.2
Adobe Photoshop 10.0
Adobe Photoshop Cs4 11.0
Adobe Photoshop 3.0
Adobe Photoshop 12.0.4
Adobe Photoshop 4.0
Adobe Photoshop 9.0.1
Adobe Photoshop 7.0
Adobe Photoshop 5.0
NA
CVE-2012-2027
Use-after-free vulnerability in Adobe Photoshop CS5 12.x prior to 12.0.5 and CS5.1 12.1.x prior to 12.1.1 allows remote malicious users to execute arbitrary code via a crafted TIFF (aka .TIF) file.
Adobe Photoshop 2.5
Adobe Photoshop 11.0
Adobe Photoshop 11.0.4
Adobe Photoshop Cs5.5
Adobe Photoshop 12.0.2
Adobe Photoshop 11.0.2
Adobe Photoshop
Adobe Photoshop 6.0.1
Adobe Photoshop 9.0
Adobe Photoshop 6.0
Adobe Photoshop 10.0.1
Adobe Photoshop 8.0
Adobe Photoshop 7.0.1
Adobe Photoshop 9.0.2
Adobe Photoshop 10.0
Adobe Photoshop Cs4 11.0
Adobe Photoshop 3.0
Adobe Photoshop 12.0.4
Adobe Photoshop 4.0
Adobe Photoshop 9.0.1
Adobe Photoshop 7.0
Adobe Photoshop 5.0
1 EDB exploit
NA
CVE-2006-0525
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
Adobe Creative Suite 2.0
Adobe Acrobat Reader 5.0.10
Adobe Acrobat Reader 4.5
Adobe Illustrator 9.0
Adobe Acrobat 3.0
Adobe Acrobat 5.0.10
Adobe Acrobat Reader 5.0
Adobe Premiere 1.5
Adobe Version Cue 1.0.1
Adobe Acrobat 4.0
Adobe Acrobat Reader 3.0
Adobe Acrobat 7.0.2
Adobe Photoshop Le
Adobe Acrobat Reader 4.0.5
Adobe Acrobat 3.1
Adobe Acrobat 7.0.3
Adobe Acrobat Reader 4.0
Adobe Illustrator 8.0
Adobe Acrobat Reader 4.0.5a
Adobe Acrobat Reader 6.0.3
Adobe Version Cue 1.0
Adobe Indesign Cs
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started