Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
after effects vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2020-9652
Adobe Premiere Pro versions 14.2 and previous versions have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .
Adobe Premiere Pro
1 Article
7.8
CVSSv3
CVE-2020-9653
Adobe Premiere Pro versions 14.2 and previous versions have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Adobe Premiere Pro
1 Article
7.8
CVSSv3
CVE-2020-9654
Adobe Premiere Pro versions 14.2 and previous versions have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Adobe Premiere Pro
1 Article
7.8
CVSSv3
CVE-2020-9661
Adobe After Effects versions 17.1 and previous versions have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .
Adobe After Effects
1 Article
7.8
CVSSv3
CVE-2020-9662
Adobe After Effects versions 17.1 and previous versions have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Adobe After Effects
1 Article
5.5
CVSSv3
CVE-2020-9666
Adobe Campaign Classic prior to 20.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Adobe Campaign Classic
1 Article
8.6
CVSSv3
CVE-2020-8616
A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to proce...
Isc Bind
Isc Bind 9.12.4
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.8
Debian Debian Linux 9.0
Debian Debian Linux 10.0
5.9
CVSSv3
CVE-2020-8617
Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whos...
Isc Bind
Isc Bind 9.12.4
Isc Bind 9.11.7
Isc Bind 9.11.3
Isc Bind 9.11.6
Isc Bind 9.10.5
Isc Bind 9.11.5
Isc Bind 9.9.3
Isc Bind 9.10.7
Isc Bind 9.11.8
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.1
Opensuse Leap 15.2
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
3 Github repositories
9.8
CVSSv3
CVE-2020-3765
Adobe After Effects versions 16.1.2 and previous versions have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe After Effects
7.5
CVSSv3
CVE-2020-5215
In TensorFlow prior to 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a...
Google Tensorflow
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »