Vulnerabilities (CVE)

Filtered by vendor Adobe Subscribe
Total 5509 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-1386 1 Adobe 1 Shockwave Player 2013-04-10 10.0 HIGH N/A
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
CVE-2013-1383 1 Adobe 1 Shockwave Player 2013-04-10 10.0 HIGH N/A
Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors.
CVE-2013-0630 5 Adobe, Apple, Google and 2 more 8 Adobe Air, Adobe Air Sdk, Flash Player and 5 more 2013-03-06 10.0 HIGH N/A
Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
CVE-2012-5273 1 Adobe 1 Shockwave Player 2013-03-02 10.0 HIGH N/A
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175.
CVE-2012-5680 1 Adobe 1 Camera Raw 2012-12-17 10.0 HIGH N/A
Buffer overflow in Adobe Photoshop Camera Raw before 7.3 allows attackers to execute arbitrary code via unspecified vectors.
CVE-2012-5679 1 Adobe 1 Camera Raw 2012-12-13 7.5 HIGH N/A
Buffer underflow in Adobe Photoshop Camera Raw before 7.3 allows attackers to execute arbitrary code via unspecified vectors.
CVE-2012-5675 1 Adobe 1 Coldfusion 2012-12-12 4.4 MEDIUM N/A
Adobe ColdFusion 9.0 through 9.0.2, and 10, allows local users to bypass intended shared-hosting sandbox permissions via unspecified vectors.
CVE-2008-5108 1 Adobe 1 Adobe Air 2012-10-31 6.8 MEDIUM N/A
Unspecified vulnerability in Adobe AIR 1.1 and earlier allows context-dependent attackers to execute untrusted JavaScript in an AIR application via unknown attack vectors.
CVE-2012-2042 1 Adobe 2 Illustrator, Illustrator Cs5.5 2012-09-29 10.0 HIGH N/A
Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026.
CVE-2010-5258 1 Adobe 1 Audition 2012-09-07 6.9 MEDIUM N/A
Untrusted search path vulnerability in Adobe Audition 3.0 build 7283.0 allows local users to gain privileges via a Trojan horse Assist.Dll file in the current working directory, as demonstrated by a directory that contains a .ses file. NOTE: some of these details are obtained from third party information.
CVE-2010-5270 1 Adobe 1 Device Central Cs4 2012-09-07 6.9 MEDIUM N/A
Multiple untrusted search path vulnerabilities in Adobe Device Central CS4 2.0.0 0476 allow local users to gain privileges via a Trojan horse (1) ibfs32.dll or (2) amt_cdb.dll file in the current working directory, as demonstrated by a directory that contains a .adcp file. NOTE: some of these details are obtained from third party information.
CVE-2010-5212 1 Adobe 1 Livecycle Designer Es2 2012-09-06 6.9 MEDIUM N/A
Untrusted search path vulnerability in Adobe LiveCycle Designer ES2 9.0.0.20091029.1.612548 allows local users to gain privileges via a Trojan horse objectassisten_US.dll file in the current working directory, as demonstrated by a directory that contains a .tds file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2012-4162 2 Adobe, Apple 3 Acrobat, Acrobat Reader, Mac Os X 2012-08-15 7.5 HIGH N/A
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4161.
CVE-2012-4161 2 Adobe, Apple 3 Acrobat, Acrobat Reader, Mac Os X 2012-08-15 7.5 HIGH N/A
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4162.
CVE-2012-2047 1 Adobe 1 Shockwave Player 2012-08-15 10.0 HIGH N/A
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046.
CVE-2012-2046 1 Adobe 1 Shockwave Player 2012-08-15 10.0 HIGH N/A
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047.
CVE-2012-2045 1 Adobe 1 Shockwave Player 2012-08-15 10.0 HIGH N/A
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047.
CVE-2012-2044 1 Adobe 1 Shockwave Player 2012-08-15 10.0 HIGH N/A
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
CVE-2012-2043 1 Adobe 1 Shockwave Player 2012-08-15 10.0 HIGH N/A
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
CVE-2012-2041 1 Adobe 1 Coldfusion 2012-06-13 4.3 MEDIUM N/A
CRLF injection vulnerability in the Component Browser in Adobe ColdFusion 8.0 through 9.0.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.