Product:

Illustrator

(Adobe)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 131
Date Id Summary Products Score Patch Annotated
2020-06-25 CVE-2020-9639 Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . Illustrator 7.8
2020-06-25 CVE-2020-9640 Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . Illustrator 7.8
2020-06-25 CVE-2020-9641 Adobe Illustrator versions 24.1.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . Illustrator 7.8
2020-06-25 CVE-2020-9642 Adobe Illustrator versions 24.1.2 and earlier have a buffer errors vulnerability. Successful exploitation could lead to arbitrary code execution . Illustrator 7.8
2020-06-26 CVE-2020-9570 Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . Illustrator 7.8
2020-06-26 CVE-2020-9571 Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. Illustrator 7.8
2020-06-26 CVE-2020-9572 Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. Illustrator 7.8
2020-06-26 CVE-2020-9573 Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. Illustrator 7.8
2020-06-26 CVE-2020-9574 Adobe Illustrator versions 24.0.2 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . Illustrator 7.8
2020-10-20 CVE-2020-24409 Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. Illustrator 7.8