Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe illustrator cs2 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-3961
Multiple unspecified vulnerabilities in Adobe Illustrator CS2 on Macintosh allow user-assisted malicious users to execute arbitrary code via a crafted AI file.
Adobe Illustrator Cs2
9.3
CVSSv2
CVE-2007-2244
Multiple buffer overflows in Adobe Photoshop CS2 and CS3, Illustrator CS3, and GoLive 9 allow user-assisted remote malicious users to execute arbitrary code via a crafted (1) BMP, (2) DIB, or (3) RLE file.
Adobe Golive 9
Adobe Illustrator Cs3
Adobe Photoshop 9.0.2
1 EDB exploit
9.3
CVSSv2
CVE-2007-2365
Buffer overflow in Adobe Photoshop CS2 and CS3, Photoshop Elements 5.0, Illustrator CS3, and GoLive 9 allows user-assisted remote malicious users to execute arbitrary code via a crafted .PNG file.
Adobe Photoshop Elements 5.0
Adobe Golive 9
Adobe Illustrator Cs3
Adobe Photoshop 9.0.2
1 EDB exploit
4.6
CVSSv2
CVE-2006-0525
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
Adobe Acrobat 4.0.5
Adobe Acrobat 4.0.5a
Adobe Acrobat 6.0.2
Adobe Acrobat 6.0.3
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 4.0.5
Adobe Acrobat Reader 6.0
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 7.0.3
Adobe Creative Suite 1.0
Adobe Illustrator Cs
Adobe Illustrator Cs3
Adobe Photoshop 8.0
Adobe Photoshop 9.0.2
Adobe Acrobat 5.0.10
Adobe Acrobat 5.0.5
Adobe Acrobat 7.0.1
Adobe Acrobat 7.0.2
Adobe Acrobat Reader 4.5
Adobe Acrobat Reader 5.0
Adobe Acrobat Reader 5.0.10
Adobe Acrobat Reader 6.0.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started