PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 5085

of 255

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to impact a minor integrity feature. Exploitation of this issue does require user interaction.

Published:   Updated:

Vulnerability Type: Deserialization of untrusted data

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.

Published:   Updated:

Vulnerability Type: Deserialization of untrusted data

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Deserialization of untrusted data

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

@adobe/css-tools version 4.3.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a minor denial of service while attempting to parse CSS. Exploitation of this issue does not require user interaction or privileges.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe FrameMaker versions 2022 and earlier are affected by an Improper Authentication vulnerability that could result in a Security feature bypass. An unauthenticated attacker can abuse this vulnerability to access the API and leak default admin's password. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that could lead to information disclosure by an unauthenticated attacker. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Xxe

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to information disclosure by an unauthenticated attacker. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Path traversal

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to Remote Code Execution by an admin authenticated attacker. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Input Validation vulnerability that could lead to information disclosure by an unauthenticated attacker. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v3N/A

Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that could lead to information disclosure by an low-privileged authenticated attacker. Exploitation of this issue does not require user interaction.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.3

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Adobe
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

of 255