Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe illustrator cs2 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2008-3961
Multiple unspecified vulnerabilities in Adobe Illustrator CS2 on Macintosh allow user-assisted malicious users to execute arbitrary code via a crafted AI file.
Adobe Illustrator Cs2
935
VMScore
CVE-2007-2244
Multiple buffer overflows in Adobe Photoshop CS2 and CS3, Illustrator CS3, and GoLive 9 allow user-assisted remote malicious users to execute arbitrary code via a crafted (1) BMP, (2) DIB, or (3) RLE file.
Adobe Golive 9
Adobe Illustrator Cs3
Adobe Photoshop 9.0.2
1 EDB exploit
935
VMScore
CVE-2007-2365
Buffer overflow in Adobe Photoshop CS2 and CS3, Photoshop Elements 5.0, Illustrator CS3, and GoLive 9 allows user-assisted remote malicious users to execute arbitrary code via a crafted .PNG file.
Adobe Photoshop Elements 5.0
Adobe Golive 9
Adobe Illustrator Cs3
Adobe Photoshop 9.0.2
1 EDB exploit
409
VMScore
CVE-2006-0525
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
Adobe Acrobat 4.0.5
Adobe Acrobat 4.0.5a
Adobe Acrobat 6.0.2
Adobe Acrobat 6.0.3
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 4.0.5
Adobe Acrobat Reader 6.0
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 7.0.3
Adobe Creative Suite 1.0
Adobe Illustrator Cs
Adobe Illustrator Cs3
Adobe Photoshop 8.0
Adobe Photoshop 9.0.2
Adobe Acrobat 5.0.10
Adobe Acrobat 5.0.5
Adobe Acrobat 7.0.1
Adobe Acrobat 7.0.2
Adobe Acrobat Reader 4.5
Adobe Acrobat Reader 5.0
Adobe Acrobat Reader 5.0.10
Adobe Acrobat Reader 6.0.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started