Page 5 of 48 results (0.003 seconds)

CVSS: 9.8EPSS: 13%CPEs: 1EXPL: 0

09 Dec 2017 — An issue was discovered in Adobe Photoshop 18.1.1 (2017.1.1) and earlier versions. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution. Se ha descubierto un problema en Adobe Photoshop 18.1.1 (2017.1.1) y anteriores. Existe una vulnerabilidad de corrupción de memoria explotable. • http://www.securityfocus.com/bid/101829 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 0

20 Nov 2017 — An issue was discovered in Adobe Photoshop 18.1.1 (2017.1.1) and earlier versions. An exploitable use-after-free vulnerability exists. Successful exploitation could lead to arbitrary code execution. Se ha descubierto un problema en Adobe Photoshop 18.1.1 (2017.1.1) y anteriores. Existe una vulnerabilidad de uso de memoria previamente liberada. • http://www.securityfocus.com/bid/101829 • CWE-416: Use After Free •

CVSS: 9.3EPSS: 47%CPEs: 28EXPL: 1

09 May 2012 — Use-after-free vulnerability in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via a crafted TIFF (aka .TIF) file. Una vulnerabilidad de uso de memoria previamente liberada en Photoshop CS5 versiones 12.x anteriores a 12.0.5 y CS5.1 versiones 12.1.x anteriores a 12.1.1 de Adobe, permite a los atacantes remotos ejecutar código arbitrario por medio de un TIFF diseñada (también se conoce como .TIF). • https://www.exploit-db.com/exploits/18633 • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 19%CPEs: 28EXPL: 0

09 May 2012 — Buffer overflow in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via unspecified vectors. Desbordamiento de buffer en Adobe Photoshop antes de CS6, permite a atacantes remotos ejecutar código de su elección a través de un archivo TIFF modificado (también conocido como .TIF). • http://www.adobe.com/support/security/bulletins/apsb12-11.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 57%CPEs: 3EXPL: 3

04 Oct 2011 — Multiple buffer overflows in Adobe Photoshop Elements 8.0 and earlier allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted (1) .grd or (2) .abr file, a related issue to CVE-2010-1296. Múltiples desbordamientos de búfer en Adobe Photoshop Elements v8.0 y anteriores permite a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída de la aplicación) o posiblemente ejecutar código arbitrario a tr... • https://www.exploit-db.com/exploits/17918 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 15EXPL: 0

20 May 2011 — Multiple unspecified vulnerabilities in Adobe Photoshop before 12.0.4 have unknown impact and attack vectors. Múltiples vulnerabilidades no especificadas en Adobe Photoshop antes de v12.0.4 tienen un impacto y vectores de ataque desconocidos. • http://blogs.adobe.com/jnack/2011/05/photoshop-12-0-4-update-for-cs5-arrives.html •

CVSS: 9.3EPSS: 70%CPEs: 4EXPL: 1

30 Apr 2007 — Buffer overflow in Adobe Photoshop CS2 and CS3, Photoshop Elements 5.0, Illustrator CS3, and GoLive 9 allows user-assisted remote attackers to execute arbitrary code via a crafted .PNG file. Un desbordamiento de búfer en Adobe Photoshop versiones CS2 y CS3, Photoshop Elements versión 5.0, Illustrator versión CS3 y GoLive versión 9, permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de un archivo .PNG especialmente diseñado. • https://www.exploit-db.com/exploits/3812 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

02 Feb 2006 — Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs. • http://secunia.com/advisories/18698 • CWE-264: Permissions, Privileges, and Access Controls •