Lucene search

K

22 matches found

CVE
CVE
added 2025/02/11 6:15 p.m.52 views

CVE-2025-21160

Illustrator versions 29.1, 28.7.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.00029EPSS
CVE
CVE
added 2025/03/11 6:15 p.m.52 views

CVE-2025-27167

Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resou...

7.8CVSS7.1AI score0.00042EPSS
CVE
CVE
added 2025/03/11 6:15 p.m.50 views

CVE-2025-27168

Illustrator versions 29.2.1, 28.7.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.4AI score0.0004EPSS
CVE
CVE
added 2025/03/11 6:15 p.m.50 views

CVE-2025-27170

Illustrator versions 29.2.1, 28.7.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue...

5.5CVSS6.5AI score0.00064EPSS
CVE
CVE
added 2025/02/11 6:15 p.m.47 views

CVE-2025-21163

Illustrator versions 29.1, 28.7.3 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.00029EPSS
CVE
CVE
added 2025/01/14 7:15 p.m.45 views

CVE-2025-21134

Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.00029EPSS
CVE
CVE
added 2025/03/11 6:15 p.m.45 views

CVE-2025-24449

Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a vic...

5.5CVSS6.1AI score0.00042EPSS
CVE
CVE
added 2025/02/11 6:15 p.m.44 views

CVE-2025-21159

Illustrator versions 29.1, 28.7.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.0003EPSS
CVE
CVE
added 2025/03/11 6:15 p.m.44 views

CVE-2025-24448

Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a vic...

5.5CVSS6.1AI score0.00042EPSS
CVE
CVE
added 2025/01/14 7:15 p.m.43 views

CVE-2025-21133

Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.00029EPSS
CVE
CVE
added 2025/03/11 6:15 p.m.43 views

CVE-2025-27169

Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.5AI score0.0004EPSS
CVE
CVE
added 2025/05/13 6:15 p.m.33 views

CVE-2025-30330

Illustrator versions 29.3, 28.7.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.6AI score0.00034EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.8 views

CVE-2025-49530

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.1AI score0.00034EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-30313

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5CVSS5.8AI score0.00024EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-49525

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5.5CVSS5.8AI score0.00024EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-49526

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.1AI score0.00034EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-49527

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-49528

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-49529

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.6 views

CVE-2025-49531

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.5 views

CVE-2025-49524

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user...

5.5CVSS6AI score0.00019EPSS
CVE
CVE
added 2025/07/08 10:15 p.m.5 views

CVE-2025-49532

Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7AI score0.00027EPSS