All the vulnerabilites related to adobe - creative_suite
cve-2007-2682
Vulnerability from cvelistv5
Published
2007-05-18 18:00
Modified
2024-08-07 13:49
Severity ?
EPSS score ?
Summary
The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/34342 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb07-11.html | x_refsource_CONFIRM | |
http://osvdb.org/35868 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/24027 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1018075 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/25291 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1850 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-installer-security-bypass(34342)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html" }, { "name": "35868", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35868" }, { "name": "24027", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24027" }, { "name": "1018075", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018075" }, { "name": "25291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25291" }, { "name": "ADV-2007-1850", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1850" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "adobe-installer-security-bypass(34342)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html" }, { "name": "35868", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35868" }, { "name": "24027", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24027" }, { "name": "1018075", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018075" }, { "name": "25291", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25291" }, { "name": "ADV-2007-1850", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1850" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2682", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-installer-security-bypass(34342)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb07-11.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html" }, { "name": "35868", "refsource": "OSVDB", "url": "http://osvdb.org/35868" }, { "name": "24027", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24027" }, { "name": "1018075", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018075" }, { "name": "25291", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25291" }, { "name": "ADV-2007-1850", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1850" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2682", "datePublished": "2007-05-18T18:00:00", "dateReserved": "2007-05-15T00:00:00", "dateUpdated": "2024-08-07T13:49:57.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0151
Vulnerability from cvelistv5
Published
2005-06-09 04:00
Modified
2024-08-07 21:05
Severity ?
EPSS score ?
Summary
Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1014168 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/techdocs/331688.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1014170 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1014169 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:24.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1014168", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014168" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/techdocs/331688.html" }, { "name": "1014170", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014170" }, { "name": "1014169", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014169" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-01-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1014168", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014168" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/techdocs/331688.html" }, { "name": "1014170", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014170" }, { "name": "1014169", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014169" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0151", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1014168", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014168" }, { "name": "http://www.adobe.com/support/techdocs/331688.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/techdocs/331688.html" }, { "name": "1014170", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014170" }, { "name": "1014169", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014169" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0151", "datePublished": "2005-06-09T04:00:00", "dateReserved": "2005-01-25T00:00:00", "dateUpdated": "2024-08-07T21:05:24.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0525
Vulnerability from cvelistv5
Published
2006-02-02 11:00
Modified
2024-08-07 16:41
Severity ?
EPSS score ?
Summary
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/techdocs/332644.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/16451 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015577 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1015579 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/423587/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/953860 | third-party-advisory, x_refsource_CERT-VN | |
http://secunia.com/advisories/18698 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf | x_refsource_MISC | |
http://securitytracker.com/id?1015578 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24464 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2006/0431 | vdb-entry, x_refsource_VUPEN | |
http://www.osvdb.org/22908 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:41:28.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/techdocs/332644.html" }, { "name": "16451", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16451" }, { "name": "1015577", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015577" }, { "name": "1015579", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015579" }, { "name": "20060131 Windows Access Control Demystified", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded" }, { "name": "VU#953860", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/953860" }, { "name": "18698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18698" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf" }, { "name": "1015578", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015578" }, { "name": "adobe-insecure-default-permissions(24464)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464" }, { "name": "ADV-2006-0431", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0431" }, { "name": "22908", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22908" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/techdocs/332644.html" }, { "name": "16451", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16451" }, { "name": "1015577", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015577" }, { "name": "1015579", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015579" }, { "name": "20060131 Windows Access Control Demystified", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded" }, { "name": "VU#953860", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/953860" }, { "name": "18698", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18698" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf" }, { "name": "1015578", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015578" }, { "name": "adobe-insecure-default-permissions(24464)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464" }, { "name": "ADV-2006-0431", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0431" }, { "name": "22908", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22908" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/techdocs/332644.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/techdocs/332644.html" }, { "name": "16451", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16451" }, { "name": "1015577", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015577" }, { "name": "1015579", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015579" }, { "name": "20060131 Windows Access Control Demystified", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded" }, { "name": "VU#953860", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/953860" }, { "name": "18698", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18698" }, { "name": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf", "refsource": "MISC", "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf" }, { "name": "1015578", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015578" }, { "name": "adobe-insecure-default-permissions(24464)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464" }, { "name": "ADV-2006-0431", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0431" }, { "name": "22908", "refsource": "OSVDB", "url": "http://www.osvdb.org/22908" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0525", "datePublished": "2006-02-02T11:00:00", "dateReserved": "2006-02-02T00:00:00", "dateUpdated": "2024-08-07T16:41:28.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2131
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-22.html | x_refsource_CONFIRM | |
http://securityreason.com/securityalert/8347 | third-party-advisory, x_refsource_SREASON |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html" }, { "name": "8347", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8347" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-22T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html" }, { "name": "8347", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8347" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2131", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html" }, { "name": "8347", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8347" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2131", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | creative_suite | 5 | |
adobe | photoshop | 12.0 | |
adobe | creative_suite | 5.1 | |
adobe | photoshop | 12.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:creative_suite:5:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F4015-50EF-4204-B275-796BAE951243", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "23A48567-6F52-44CB-959E-47DFAF5FACF5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:creative_suite:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAD2502D-5226-4157-921E-4D84F2A70E68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "5376E1E4-E7B7-415D-9A1D-8CF27C715916", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file." }, { "lang": "es", "value": "Adobe Photoshop v12.0 en Creative Suite 5 (CS5) y v12.1 en Creative Suite v5.1 (CS5.1) permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo GIF creado." } ], "id": "CVE-2011-2131", "lastModified": "2024-11-21T01:27:39.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-08-11T22:55:00.910", "references": [ { "source": "psirt@adobe.com", "url": "http://securityreason.com/securityalert/8347" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-18 18:30
Modified
2024-11-21 00:31
Severity ?
Summary
The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apple | mac_os_x | * | |
adobe | creative_suite | 3.0 | |
adobe | creative_suite | 3.0 | |
adobe | creative_suite | 3.0 | |
adobe | creative_suite | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:design_premium:*:*:*:*:*", "matchCriteriaId": "E31B5FCD-D79F-4805-8BF9-84AB325C31E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:design_standard:*:*:*:*:*", "matchCriteriaId": "4FD632E2-BD2F-4153-A47D-B139A825F362", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:web_premium:*:*:*:*:*", "matchCriteriaId": "D2CF17B5-5E1C-4538-BE02-6C75160229A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:web_standard:*:*:*:*:*", "matchCriteriaId": "AF2E7AB9-3BF2-45B1-8789-C1881EC9664B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules." }, { "lang": "es", "value": "El instalador para la versi\u00f3n de Adobe Version Cue CS3 Server on Apple Mac OS X, como el utilizado por el Adobe Creative Suite 3 (CS3), no rehabilita el cortafuegos personal despu\u00e9s de completar la instalaci\u00f3n del producto, lo que permite a atacantes remotos evitar intencionadamente la reglas de cortafuegos." } ], "id": "CVE-2007-2682", "lastModified": "2024-11-21T00:31:23.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-18T18:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/35868" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25291" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1018075" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24027" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1850" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1018075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-13 04:00
Modified
2024-11-20 23:54
Severity ?
Summary
Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:creative_suite:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC9C6894-B756-4189-AE82-B234449925DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0820E48-12AD-4112-BC83-D81045D64AA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:premiere:1.5:*:pro:*:*:*:*:*", "matchCriteriaId": "0A0C3110-C713-497B-AC49-4CCE35E7FD49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges." } ], "id": "CVE-2005-0151", "lastModified": "2024-11-20T23:54:31.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-13T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014168" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014169" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014170" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/techdocs/331688.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/techdocs/331688.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-02-02 11:02
Modified
2024-11-21 00:06
Severity ?
Summary
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:creative_suite:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC9C6894-B756-4189-AE82-B234449925DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:creative_suite:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "ADA16570-F6F8-4FA7-B88B-C3890F040C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:creative_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C51CA73D-6CD2-4597-A0EF-39C748EBA508", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:illustrator:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "541B9668-6BEB-49BB-9C75-44D2595B2E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:illustrator:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "88C95931-0247-4605-B2C5-35EB7D654B4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:illustrator:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1AA37B5-DE58-4856-9EE8-8FFAF6CC9E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:illustrator:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BF8CE1A-B768-4A77-9A46-8F0158E44D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:illustrator:cs:*:*:*:*:*:*:*", "matchCriteriaId": "B1FFC4D8-B7D1-4D74-8C00-1AC11A7373DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:illustrator:cs3:*:*:*:*:*:*:*", "matchCriteriaId": "F2544447-313B-42DD-831B-E1AED3B6086F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:indesign:cs:*:*:*:*:*:*:*", "matchCriteriaId": "FFF91AF9-BFDB-4618-90FE-875FF8FFA3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:indesign:cs3:*:*:*:*:*:*:*", "matchCriteriaId": "31870168-D8E9-4439-9C9D-994F35FEFB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:pagemaker:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC38A3-0BE2-4862-B5F1-0340FB21BCC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:pagemaker:6.5:*:plus:*:*:*:*:*", "matchCriteriaId": "7E584707-1A7C-492C-96A5-CDB8D77DCC95", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:pagemaker:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4748647-13D5-48DF-9DBE-75EBFF8BC647", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:pagemaker:7.0:*:plus:*:*:*:*:*", "matchCriteriaId": "5594EAAC-5AC9-4CF4-B664-AB654B99D548", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD03FB10-858D-4B2B-B86A-46AEBF7DA63E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0820E48-12AD-4112-BC83-D81045D64AA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F1D2452-C141-4A9E-ACA9-61A44FB63302", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:photoshop:le:*:*:*:*:*:*:*", "matchCriteriaId": "4C0A4519-88EA-448D-840E-8679977BA7F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:premiere:1.5:*:pro:*:*:*:*:*", "matchCriteriaId": "0A0C3110-C713-497B-AC49-4CCE35E7FD49", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:version_cue:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABD4E1CD-8226-4308-8B6F-65B7AFB1CE32", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:version_cue:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ABC546A-EE59-47E3-A0F0-9210050121D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:version_cue:gold:*:mac_os_x:*:*:*:*:*", "matchCriteriaId": "A10F07F5-5C99-40D5-9C15-C1DDA8D98B7C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs." } ], "id": "CVE-2006-0525", "lastModified": "2024-11-21T00:06:39.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-02T11:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18698" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015577" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015578" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015579" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/techdocs/332644.html" }, { "source": "cve@mitre.org", "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/953860" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22908" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16451" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0431" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/techdocs/332644.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/953860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }