Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pagemaker vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2007-6021
Heap-based buffer overflow in Adobe PageMaker 7.0.1 and 7.0.2 allows user-assisted remote malicious users to execute arbitrary code via a .PMD file with a crafted font structure.
Adobe Pagemaker 7.0.1
Adobe Pagemaker 7.0.2
828
VMScore
CVE-2007-6432
Stack-based buffer overflow in AldFs32.dll in Adobe PageMaker 7.0.1 and 7.0.2 allows user-assisted remote malicious users to execute arbitrary code via a malformed .PMD file, related to "Key Strings," a different vulnerability than CVE-2007-5169 and CVE-2007-5394.
Adobe Pagemaker 7.0.1
Adobe Pagemaker 7.0.2
828
VMScore
CVE-2007-5394
Stack-based buffer overflow in AldFs32.dll in Adobe PageMaker 7.0.1 and 7.0.2 allows user-assisted remote malicious users to execute arbitrary code via a .PMD file with a crafted font structure, a different vulnerability than CVE-2007-5169 and CVE-2007-6432.
Adobe Pagemaker 7.0.1
Adobe Pagemaker 7.0.2
828
VMScore
CVE-2007-5169
Stack-based buffer overflow in MAIPM6.dll in Adobe PageMaker 7.0.1 and 7.0.2 on Windows allows user-assisted remote malicious users to execute arbitrary code via a long font name in a .PMD file.
Adobe Pagemaker 7.0.1
Adobe Pagemaker 7.0.2
NA
CVE-2023-26063
Certain Lexmark devices through 2023-02-19 access a Resource By Using an Incompatible Type.
Lexmark Cxtpc Firmware
Lexmark Cstpc Firmware
Lexmark Mxtct Firmware
Lexmark Mxtpm Firmware
Lexmark Cxtmm Firmware
Lexmark Mslsg Firmware
Lexmark Mxlsg Firmware
Lexmark Mslbd Firmware
Lexmark Mxlbd Firmware
Lexmark Msngm Firmware
Lexmark Mxngm Firmware
Lexmark Mxtgm Firmware
Lexmark Msngw Firmware
Lexmark Mstgw Firmware
Lexmark Mxtgw Firmware
Lexmark Cslbn Firmware
Lexmark Cslbl Firmware
Lexmark Cxlbn Firmware
Lexmark Cxlbl Firmware
Lexmark Cstzj Firmware
Lexmark Csnzj Firmware
Lexmark Cxtzj Firmware
409
VMScore
CVE-2006-0525
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
Adobe Acrobat 4.0.5
Adobe Acrobat 4.0.5a
Adobe Acrobat 6.0.2
Adobe Acrobat 6.0.3
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 4.0.5
Adobe Acrobat Reader 6.0
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 7.0.3
Adobe Creative Suite 1.0
Adobe Illustrator Cs
Adobe Illustrator Cs3
Adobe Photoshop 8.0
Adobe Photoshop 9.0.2
Adobe Acrobat 5.0.10
Adobe Acrobat 5.0.5
Adobe Acrobat 7.0.1
Adobe Acrobat 7.0.2
Adobe Acrobat Reader 4.5
Adobe Acrobat Reader 5.0
Adobe Acrobat Reader 5.0.10
Adobe Acrobat Reader 6.0.4
890
VMScore
CVE-2021-44738
Buffer overflow vulnerability has been identified in Lexmark devices through 2021-12-07 in postscript interpreter.
Lexmark B2236 Firmware
Lexmark Mb2236 Firmware
Lexmark Ms431 Firmware
Lexmark Ms331 Firmware
Lexmark M1342 Firmware
Lexmark B3442 Firmware
Lexmark B3340 Firmware
Lexmark Xm1342 Firmware
Lexmark Mx331 Firmware
Lexmark Mx431 Firmware
Lexmark Mb3442 Firmware
Lexmark Ms321 Firmware
Lexmark Ms421 Firmware
Lexmark Ms521 Firmware
Lexmark Ms621 Firmware
Lexmark M1242 Firmware
Lexmark M1246 Firmware
Lexmark B2338 Firmware
Lexmark B2442 Firmware
Lexmark B2546 Firmware
Lexmark B2650 Firmware
Lexmark Ms622 Firmware
NA
CVE-2023-50735
A heap corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an malicious user to execute arbitrary code.
NA
CVE-2023-50736
A memory corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an malicious user to execute arbitrary code.
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started