Filtered by vendor Adobe Subscriptions
Filtered by product Illustrator Subscriptions
Total 139 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2020-9642 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.1.2 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9641 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9640 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9639 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9575 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9574 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9573 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9572 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9571 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9570 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-24415 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2020-24414 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2020-24413 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2020-24412 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.1.2 (and earlier) is affected by a memory corruption vulnerability that occurs when parsing a specially crafted .svg file. This could result in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2020-24411 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds write vulnerability when handling crafted PDF files. This could result in a write past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2020-24410 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2020-24409 2 Adobe, Microsoft 2 Illustrator, Windows 2024-11-21 7.8 High
Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
CVE-2024-47452 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-11-14 7.8 High
Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45114 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-11-14 7.8 High
Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47450 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-11-14 7.8 High
Illustrator versions 28.7.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.