Vulnerabilites related to adobe - premiere_pro
cve-2021-42265
Vulnerability from cvelistv5
Published
2023-09-07 12:54
Modified
2024-08-04 03:30
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    15.4.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T03:30:37.853Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2021-12-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 5.5,
                  environmentalSeverity: "MEDIUM",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "NONE",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "NONE",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-07T12:54:36.875Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-42265",
      datePublished: "2023-09-07T12:54:36.875Z",
      dateReserved: "2021-10-12T13:29:02.275Z",
      dateUpdated: "2024-08-04T03:30:37.853Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-47058
Vulnerability from cvelistv5
Published
2023-11-16 16:16
Modified
2024-09-04 20:32
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:01:22.808Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.0",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-47058",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-08T20:26:15.552414Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-04T20:32:37.495Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.0",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-16T16:16:28.877Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-21766: Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2023-47058",
      datePublished: "2023-11-16T16:16:28.877Z",
      dateReserved: "2023-10-30T16:23:27.886Z",
      dateUpdated: "2024-09-04T20:32:37.495Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-34123
Vulnerability from cvelistv5
Published
2024-07-09 19:06
Modified
2024-08-02 02:42
Summary
Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.4.1
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.4.1",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "23.6.5",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-34123",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-09T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-10T03:55:21.527Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:42:59.955Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.4.1",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-07-09T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "HIGH",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-426",
                     description: "Untrusted Search Path (CWE-426)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-07-09T19:06:50.067Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro arbitrary DLL loading lead to remote code execution",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2024-34123",
      datePublished: "2024-07-09T19:06:50.067Z",
      dateReserved: "2024-04-30T19:50:50.908Z",
      dateUpdated: "2024-08-02T02:42:59.955Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-24424
Vulnerability from cvelistv5
Published
2020-10-21 20:53
Modified
2024-09-17 04:04
Summary
Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T15:12:08.629Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "14.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-10-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-427",
                     description: "Uncontrolled Search Path Element (CWE-427)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-21T20:53:23",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Uncontrolled Search Path in Adobe Premiere Pro for Windows",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2020-10-20T23:00:00.000Z",
               ID: "CVE-2020-24424",
               STATE: "PUBLIC",
               TITLE: "Uncontrolled Search Path in Adobe Premiere Pro for Windows",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "14.4",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "High",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Uncontrolled Search Path Element (CWE-427)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2020-24424",
      datePublished: "2020-10-21T20:53:23.676742Z",
      dateReserved: "2020-08-19T00:00:00",
      dateUpdated: "2024-09-17T04:04:16.469Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40791
Vulnerability from cvelistv5
Published
2023-09-07 12:54
Modified
2024-08-04 02:51
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    15.4.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:07.051Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2021-12-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 5.5,
                  environmentalSeverity: "MEDIUM",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "NONE",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "NONE",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-07T12:54:38.479Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro JPEG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40791",
      datePublished: "2023-09-07T12:54:38.479Z",
      dateReserved: "2021-09-08T16:58:12.682Z",
      dateUpdated: "2024-08-04T02:51:07.051Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-9653
Vulnerability from cvelistv5
Published
2020-06-25 21:12
Modified
2024-08-04 10:34
Severity ?
Summary
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Impacted products
Vendor Product Version
Adobe Adobe Premiere Pro Version: 14.2 and earlier versions
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:34:39.928Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Adobe Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     status: "affected",
                     version: "14.2 and earlier versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-Bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-25T21:12:23",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               ID: "CVE-2020-9653",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Adobe Premiere Pro",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "14.2 and earlier versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-Bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
                     refsource: "CONFIRM",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2020-9653",
      datePublished: "2020-06-25T21:12:23",
      dateReserved: "2020-03-02T00:00:00",
      dateUpdated: "2024-08-04T10:34:39.928Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-39384
Vulnerability from cvelistv5
Published
2024-09-13 08:33
Modified
2024-09-13 13:20
Summary
Premiere Pro versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    23.6.8
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.5",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "23.6.8",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-39384",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-13T13:18:59.868279Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-13T13:20:31.474Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "23.6.8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-09-10T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Premiere Pro versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "UNCHANGED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "Out-of-bounds Write (CWE-787)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-13T08:33:52.743Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Premiere Pro | Out-of-bounds Write (CWE-787)",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2024-39384",
      datePublished: "2024-09-13T08:33:52.743Z",
      dateReserved: "2024-06-24T20:32:06.588Z",
      dateUpdated: "2024-09-13T13:20:31.474Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40795
Vulnerability from cvelistv5
Published
2023-09-07 12:54
Modified
2024-08-04 02:51
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    15.4.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:07.086Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2021-12-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-07T12:54:34.886Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro 3GP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40795",
      datePublished: "2023-09-07T12:54:34.886Z",
      dateReserved: "2021-09-08T16:58:12.684Z",
      dateUpdated: "2024-08-04T02:51:07.086Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-47059
Vulnerability from cvelistv5
Published
2023-11-16 16:16
Modified
2024-09-04 20:38
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:01:22.685Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.0",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-47059",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-08T20:26:15.552414Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-04T20:38:08.249Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.0",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-16T16:16:27.771Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-21767: Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2023-47059",
      datePublished: "2023-11-16T16:16:27.771Z",
      dateReserved: "2023-10-30T16:23:27.886Z",
      dateUpdated: "2024-09-04T20:38:08.249Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-43751
Vulnerability from cvelistv5
Published
2023-09-07 12:54
Modified
2024-08-04 04:03
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    15.4.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:03:08.743Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2021-12-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 3.3,
                  environmentalSeverity: "LOW",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "NONE",
                  modifiedConfidentialityImpact: "LOW",
                  modifiedIntegrityImpact: "NONE",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 3.3,
                  temporalSeverity: "LOW",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-07T12:54:28.242Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-43751",
      datePublished: "2023-09-07T12:54:28.242Z",
      dateReserved: "2021-11-15T21:18:52.497Z",
      dateUpdated: "2024-08-04T04:03:08.743Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-9652
Vulnerability from cvelistv5
Published
2020-06-25 21:12
Modified
2024-08-04 10:34
Severity ?
Summary
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .
Impacted products
Vendor Product Version
Adobe Adobe Premiere Pro Version: 14.2 and earlier versions
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:34:39.887Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Adobe Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     status: "affected",
                     version: "14.2 and earlier versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-Of-Bounds Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-25T21:12:48",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               ID: "CVE-2020-9652",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Adobe Premiere Pro",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "14.2 and earlier versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-Of-Bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
                     refsource: "CONFIRM",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2020-9652",
      datePublished: "2020-06-25T21:12:48",
      dateReserved: "2020-03-02T00:00:00",
      dateUpdated: "2024-08-04T10:34:39.887Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-39385
Vulnerability from cvelistv5
Published
2024-09-13 08:33
Modified
2024-09-13 13:20
Summary
Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    23.6.8
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-39385",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-13T13:18:24.020412Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-13T13:20:48.251Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "23.6.8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-09-10T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 5.5,
                  environmentalSeverity: "MEDIUM",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "NONE",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "NONE",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "UNCHANGED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "Use After Free (CWE-416)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-13T08:33:51.970Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Premiere Pro | Use After Free (CWE-416)",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2024-39385",
      datePublished: "2024-09-13T08:33:51.970Z",
      dateReserved: "2024-06-24T20:32:06.588Z",
      dateUpdated: "2024-09-13T13:20:48.251Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40793
Vulnerability from cvelistv5
Published
2022-03-16 14:03
Modified
2024-09-17 03:07
Summary
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:07.085Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-788",
                     description: "Access of Memory Location After End of Buffer (CWE-788)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:16",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro WAV file memory corruption vulnerability could lead to arbitrary code execution",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-40793",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro WAV file memory corruption vulnerability could lead to arbitrary code execution",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access of Memory Location After End of Buffer (CWE-788)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40793",
      datePublished: "2022-03-16T14:03:16.550694Z",
      dateReserved: "2021-09-08T00:00:00",
      dateUpdated: "2024-09-17T03:07:19.910Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-9616
Vulnerability from cvelistv5
Published
2020-06-26 19:58
Modified
2024-08-04 10:34
Severity ?
Summary
Adobe Premiere Pro versions 14.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Impacted products
Vendor Product Version
Adobe Adobe Premiere Pro Version: 14.1 and earlier versions
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:34:39.587Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-27.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Adobe Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     status: "affected",
                     version: "14.1 and earlier versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 14.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-Of-Bounds Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-26T19:58:32",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-27.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               ID: "CVE-2020-9616",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Adobe Premiere Pro",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "14.1 and earlier versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro versions 14.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-Of-Bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-27.html",
                     refsource: "CONFIRM",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-27.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2020-9616",
      datePublished: "2020-06-26T19:58:32",
      dateReserved: "2020-03-02T00:00:00",
      dateUpdated: "2024-08-04T10:34:39.587Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40790
Vulnerability from cvelistv5
Published
2023-09-07 12:54
Modified
2024-08-04 02:51
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    15.4.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:06.924Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2021-12-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 5.5,
                  environmentalSeverity: "MEDIUM",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "NONE",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "NONE",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 5.5,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "Use After Free (CWE-416)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-07T12:54:42.216Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro MOV File Parsing Use-After-Free Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40790",
      datePublished: "2023-09-07T12:54:42.216Z",
      dateReserved: "2021-09-08T16:58:12.682Z",
      dateUpdated: "2024-08-04T02:51:06.924Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40715
Vulnerability from cvelistv5
Published
2021-09-29 15:40
Modified
2024-09-16 18:39
Summary
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:07.038Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-09-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-788",
                     description: "Access of Memory Location After End of Buffer (CWE-788)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-29T15:40:49",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro 2021 EXR File Parsing Leads to Memory Corruption",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-09-14T23:00:00.000Z",
               ID: "CVE-2021-40715",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro 2021 EXR File Parsing Leads to Memory Corruption",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access of Memory Location After End of Buffer (CWE-788)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40715",
      datePublished: "2021-09-29T15:40:49.624842Z",
      dateReserved: "2021-09-08T00:00:00",
      dateUpdated: "2024-09-16T18:39:04.496Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40710
Vulnerability from cvelistv5
Published
2021-09-29 15:41
Modified
2024-09-16 17:48
Summary
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:06.679Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-09-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-788",
                     description: "Access of Memory Location After End of Buffer (CWE-788)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-29T15:41:07",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro 2021 SVG File Parsing Leads to Memory Corruption",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-09-14T23:00:00.000Z",
               ID: "CVE-2021-40710",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro 2021 SVG File Parsing Leads to Memory Corruption",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access of Memory Location After End of Buffer (CWE-788)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40710",
      datePublished: "2021-09-29T15:41:07.817013Z",
      dateReserved: "2021-09-08T00:00:00",
      dateUpdated: "2024-09-16T17:48:08.014Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20745
Vulnerability from cvelistv5
Published
2024-03-18 14:59
Modified
2024-08-01 21:59
Summary
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    23.6.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.1",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "23.6.2",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-20745",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-03-18T16:09:59.297428Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-18T20:33:52.847Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:59:42.957Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "23.6.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-03-12T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Premiere Pro versions 24.1, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "Heap-based Buffer Overflow (CWE-122)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-03-18T14:59:22.395Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-22671: Adobe Premiere Pro AVI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2024-20745",
      datePublished: "2024-03-18T14:59:22.395Z",
      dateReserved: "2023-12-04T16:52:22.974Z",
      dateUpdated: "2024-08-01T21:59:42.957Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-9654
Vulnerability from cvelistv5
Published
2020-06-25 21:12
Modified
2024-08-04 10:34
Severity ?
Summary
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Impacted products
Vendor Product Version
Adobe Adobe Premiere Pro Version: 14.2 and earlier versions
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:34:39.862Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Adobe Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     status: "affected",
                     version: "14.2 and earlier versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-Bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-25T21:12:34",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               ID: "CVE-2020-9654",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Adobe Premiere Pro",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "14.2 and earlier versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-Bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
                     refsource: "CONFIRM",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2020-9654",
      datePublished: "2020-06-25T21:12:34",
      dateReserved: "2020-03-02T00:00:00",
      dateUpdated: "2024-08-04T10:34:39.862Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-47060
Vulnerability from cvelistv5
Published
2023-11-16 16:16
Modified
2024-08-02 21:01
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:01:22.798Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.0",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 3.3,
                  environmentalSeverity: "LOW",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "NONE",
                  modifiedConfidentialityImpact: "LOW",
                  modifiedIntegrityImpact: "NONE",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 3.3,
                  temporalSeverity: "LOW",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-824",
                     description: "Access of Uninitialized Pointer (CWE-824)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-16T16:16:29.663Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-21792: Adobe Premiere Pro MP4 File Uninitialized Variable Information Disclosure Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2023-47060",
      datePublished: "2023-11-16T16:16:29.663Z",
      dateReserved: "2023-10-30T16:23:27.886Z",
      dateUpdated: "2024-08-02T21:01:22.798Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-20746
Vulnerability from cvelistv5
Published
2024-03-18 14:59
Modified
2024-08-01 21:59
Summary
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    23.6.2
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.1",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "23.6.2",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-20746",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-03-18T16:12:01.004957Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-18T20:35:18.906Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T21:59:42.946Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "23.6.2",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-03-12T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Premiere Pro versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "Out-of-bounds Write (CWE-787)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-03-18T14:59:23.153Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro Out-of-bounds Write Arbitrary code execution",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2024-20746",
      datePublished: "2024-03-18T14:59:23.153Z",
      dateReserved: "2023-12-04T16:52:22.974Z",
      dateUpdated: "2024-08-01T21:59:42.946Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-47055
Vulnerability from cvelistv5
Published
2023-11-16 16:16
Modified
2024-09-04 20:40
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:01:22.350Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.0",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-47055",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-08T20:26:15.552414Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-04T20:40:19.322Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.0",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "Use After Free (CWE-416)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-16T16:16:27.000Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-21765: Adobe Premiere Pro M4A File Parsing Use-After-Free Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2023-47055",
      datePublished: "2023-11-16T16:16:27.000Z",
      dateReserved: "2023-10-30T16:23:27.885Z",
      dateUpdated: "2024-09-04T20:40:19.322Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-42263
Vulnerability from cvelistv5
Published
2022-03-16 14:03
Modified
2024-09-16 18:49
Summary
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T03:30:37.900Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "NULL Pointer Dereference (CWE-476)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:12",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro Null Pointer Dereference Application denial-of-service",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-42263",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro Null Pointer Dereference Application denial-of-service",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NULL Pointer Dereference (CWE-476)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-42263",
      datePublished: "2022-03-16T14:03:12.172433Z",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-09-16T18:49:45.344Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-46816
Vulnerability from cvelistv5
Published
2022-06-13 12:19
Modified
2024-09-16 23:31
Summary
Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:17:42.672Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-09-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "Out-of-bounds Write (CWE-787)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-13T12:19:12",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro M4A file memory corruption vulnerability could lead to remote code execution",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-09-14T23:00:00.000Z",
               ID: "CVE-2021-46816",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro M4A file memory corruption vulnerability could lead to remote code execution",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-bounds Write (CWE-787)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-46816",
      datePublished: "2022-06-13T12:19:12.164320Z",
      dateReserved: "2022-06-09T00:00:00",
      dateUpdated: "2024-09-16T23:31:37.295Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40794
Vulnerability from cvelistv5
Published
2022-03-16 14:03
Modified
2024-09-16 17:49
Summary
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:06.684Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-788",
                     description: "Access of Memory Location After End of Buffer (CWE-788)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:14",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro MOV file memory corruption vulnerability could lead to arbitrary code execution",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-40794",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro MOV file memory corruption vulnerability could lead to arbitrary code execution",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access of Memory Location After End of Buffer (CWE-788)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40794",
      datePublished: "2022-03-16T14:03:14.509643Z",
      dateReserved: "2021-09-08T00:00:00",
      dateUpdated: "2024-09-16T17:49:10.624Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-47056
Vulnerability from cvelistv5
Published
2023-11-16 16:16
Modified
2024-08-02 21:01
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:01:22.620Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.0",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "Heap-based Buffer Overflow (CWE-122)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-16T16:16:30.469Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-21763: Adobe Premiere Pro MP4 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2023-47056",
      datePublished: "2023-11-16T16:16:30.469Z",
      dateReserved: "2023-10-30T16:23:27.886Z",
      dateUpdated: "2024-08-02T21:01:22.620Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40792
Vulnerability from cvelistv5
Published
2022-03-16 14:03
Modified
2024-09-17 01:07
Summary
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:07.442Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-788",
                     description: "Access of Memory Location After End of Buffer (CWE-788)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:13",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro WAV file memory corruption vulnerability could lead to arbitrary code execution",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-40792",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro WAV file memory corruption vulnerability could lead to arbitrary code execution",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access of Memory Location After End of Buffer (CWE-788)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40792",
      datePublished: "2022-03-16T14:03:13.289185Z",
      dateReserved: "2021-09-08T00:00:00",
      dateUpdated: "2024-09-17T01:07:03.536Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-42264
Vulnerability from cvelistv5
Published
2022-03-16 14:03
Modified
2024-09-16 23:46
Summary
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T03:30:37.836Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "NULL Pointer Dereference (CWE-476)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:17",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro Null Pointer Dereference Application denial-of-service",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-42264",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro Null Pointer Dereference Application denial-of-service",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NULL Pointer Dereference (CWE-476)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-42264",
      datePublished: "2022-03-16T14:03:17.829152Z",
      dateReserved: "2021-10-12T00:00:00",
      dateUpdated: "2024-09-16T23:46:32.876Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-42723
Vulnerability from cvelistv5
Published
2021-11-16 21:06
Modified
2024-09-16 19:47
Summary
Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Bridge Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T03:38:50.150Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/bridge/apsb21-94.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Bridge",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "11.1.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read (CWE-125)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:00",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/bridge/apsb21-94.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Bridge Out-of-bounds read could lead to Arbitrary Code Execution",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-42723",
               STATE: "PUBLIC",
               TITLE: "Adobe Bridge Out-of-bounds read could lead to Arbitrary Code Execution",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Bridge",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "11.1.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-bounds Read (CWE-125)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/bridge/apsb21-94.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/bridge/apsb21-94.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-42723",
      datePublished: "2021-11-16T21:06:38.023545Z",
      dateReserved: "2021-10-19T00:00:00",
      dateUpdated: "2024-09-16T19:47:11.948Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-53956
Vulnerability from cvelistv5
Published
2024-12-10 21:18
Modified
2024-12-17 04:55
Summary
Premiere Pro versions 25.0, 24.6.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.6.3
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-53956",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-12-16T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-17T04:55:56.183Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.6.3",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-12-10T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Premiere Pro versions 25.0, 24.6.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "UNCHANGED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "Heap-based Buffer Overflow (CWE-122)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-10T21:18:08.121Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-104.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Premiere Pro | Heap-based Buffer Overflow (CWE-122)",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2024-53956",
      datePublished: "2024-12-10T21:18:08.121Z",
      dateReserved: "2024-11-25T17:39:04.108Z",
      dateUpdated: "2024-12-17T04:55:56.183Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-35997
Vulnerability from cvelistv5
Published
2021-08-20 18:10
Modified
2024-09-16 20:07
Summary
Adobe Premiere Pro version 15.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:47:42.562Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-56.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-07-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 15.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-788",
                     description: "Access of Memory Location After End of Buffer (CWE-788)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-20T18:10:13",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-56.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro Memory Corruption Remote Code Execution Vulnerability",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-07-20T23:00:00.000Z",
               ID: "CVE-2021-35997",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro Memory Corruption Remote Code Execution Vulnerability",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.2",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro version 15.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access of Memory Location After End of Buffer (CWE-788)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-56.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-56.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-35997",
      datePublished: "2021-08-20T18:10:13.834724Z",
      dateReserved: "2021-06-30T00:00:00",
      dateUpdated: "2024-09-16T20:07:48.571Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-40796
Vulnerability from cvelistv5
Published
2022-03-16 14:03
Modified
2024-09-16 17:18
Summary
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Version: unspecified   <
Version: unspecified   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:51:07.378Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Premiere",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "15.4.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "None",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "NULL Pointer Dereference (CWE-476)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-16T14:03:10",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Adobe Premiere Pro Null Pointer Dereference Application denial-of-service",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@adobe.com",
               DATE_PUBLIC: "2021-10-26T23:00:00.000Z",
               ID: "CVE-2021-40796",
               STATE: "PUBLIC",
               TITLE: "Adobe Premiere Pro Null Pointer Dereference Application denial-of-service",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Premiere",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_value: "15.4.1",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "None",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Adobe",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  userInteraction: "Required",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NULL Pointer Dereference (CWE-476)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                     refsource: "MISC",
                     url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
                  },
               ],
            },
            source: {
               discovery: "EXTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2021-40796",
      datePublished: "2022-03-16T14:03:10.960485Z",
      dateReserved: "2021-09-08T00:00:00",
      dateUpdated: "2024-09-16T17:18:54.901Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-47057
Vulnerability from cvelistv5
Published
2023-11-16 16:16
Modified
2024-09-04 20:41
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
Adobe Premiere Pro Version: 0    24.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:01:22.678Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "premiere_pro",
                  vendor: "adobe",
                  versions: [
                     {
                        lessThanOrEqual: "24.0",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-47057",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-11-22T18:26:24.357699Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-04T20:41:39.534Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "Premiere Pro",
               vendor: "Adobe",
               versions: [
                  {
                     lessThanOrEqual: "24.0",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  availabilityRequirement: "NOT_DEFINED",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  confidentialityRequirement: "NOT_DEFINED",
                  environmentalScore: 7.8,
                  environmentalSeverity: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  integrityRequirement: "NOT_DEFINED",
                  modifiedAttackComplexity: "LOW",
                  modifiedAttackVector: "LOCAL",
                  modifiedAvailabilityImpact: "HIGH",
                  modifiedConfidentialityImpact: "HIGH",
                  modifiedIntegrityImpact: "HIGH",
                  modifiedPrivilegesRequired: "NONE",
                  modifiedScope: "NOT_DEFINED",
                  modifiedUserInteraction: "REQUIRED",
                  privilegesRequired: "NONE",
                  remediationLevel: "NOT_DEFINED",
                  reportConfidence: "NOT_DEFINED",
                  scope: "UNCHANGED",
                  temporalScore: 7.8,
                  temporalSeverity: "HIGH",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "Out-of-bounds Write (CWE-787)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-16T16:16:26.228Z",
            orgId: "078d4453-3bcd-4900-85e6-15281da43538",
            shortName: "adobe",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "ZDI-CAN-21764: Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability",
      },
   },
   cveMetadata: {
      assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538",
      assignerShortName: "adobe",
      cveId: "CVE-2023-47057",
      datePublished: "2023-11-16T16:16:26.228Z",
      dateReserved: "2023-10-30T16:23:27.886Z",
      dateUpdated: "2024-09-04T20:41:39.534Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2023-11-16 17:15
Modified
2024-11-21 08:29
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 24.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF0FF73-E9FD-4D83-A812-EC45C0638401",
                     versionEndIncluding: "23.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEE067D-6646-43C6-987C-35BB0EF7C3F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 24.0 (y anteriores) y 23.6 (y anteriores), están afectadas por una vulnerabilidad de escritura fuera de límites que podría resultar en una ejecución de código arbitrario en el contexto del usuario actual. Una explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2023-47057",
   lastModified: "2024-11-21T08:29:41.660",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-16T17:15:07.700",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-07 13:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBB0B918-2D63-45CD-B1F2-9660207DCD9F",
                     versionEndExcluding: "15.4.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C35A95-8F50-4A12-9809-8FE50F1AB75B",
                     versionEndExcluding: "22.1.1",
                     versionStartIncluding: "22.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 22.0 (y anteriores) y 15.4.2 (y anteriores) de Adobe Premiere Pro se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memoria sensible. Un atacante podría aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.\n",
      },
   ],
   id: "CVE-2021-40791",
   lastModified: "2024-11-21T06:24:48.340",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-07T13:15:07.597",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-29 16:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2A1CD2-09C0-48DE-9257-6C3126365434",
                     versionEndIncluding: "15.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 15.4 (y las anteriores), está afectada por una vulnerabilidad de corrupción de memoria debido a una administración no segura de un archivo .exr malicioso, resultando potencialmente en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario, ya que la víctima debe abrir un archivo especialmente diseñado para explotar esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-40715",
   lastModified: "2024-11-21T06:24:37.390",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-29T16:15:11.543",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-788",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-03-18 15:15
Modified
2024-12-04 22:07
Summary
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20EDCC65-982D-4AC5-837A-C0185DE70A2E",
                     versionEndExcluding: "23.6.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6E39ED0-A7E1-40F7-B42D-B9CF812FB96D",
                     versionEndExcluding: "24.2.1",
                     versionStartIncluding: "24.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Premiere Pro versions 24.1, 23.6.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 24.1, 23.6.2 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de desbordamiento de búfer de almacenamiento dinámico que podría provocar la ejecución de código arbitrario en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2024-20745",
   lastModified: "2024-12-04T22:07:18.903",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-03-18T15:15:41.380",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-07 13:15
Modified
2024-11-21 06:29
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBB0B918-2D63-45CD-B1F2-9660207DCD9F",
                     versionEndExcluding: "15.4.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C35A95-8F50-4A12-9809-8FE50F1AB75B",
                     versionEndExcluding: "22.1.1",
                     versionStartIncluding: "22.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 22.0 (y anteriores) y 15.4.2 (y anteriores) de Adobe Premiere Pro se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memoria sensible. Un atacante podría aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.\n",
      },
   ],
   id: "CVE-2021-43751",
   lastModified: "2024-11-21T06:29:42.913",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 1.4,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-07T13:15:08.140",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-07 13:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBB0B918-2D63-45CD-B1F2-9660207DCD9F",
                     versionEndExcluding: "15.4.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C35A95-8F50-4A12-9809-8FE50F1AB75B",
                     versionEndExcluding: "22.1.1",
                     versionStartIncluding: "22.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 22.0 (y anteriores) y 15.4.2 (y anteriores) de Adobe Premiere Pro se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memoria sensible. Un atacante podría aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.\n",
      },
   ],
   id: "CVE-2021-40790",
   lastModified: "2024-11-21T06:24:48.177",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-07T13:15:07.507",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-16 22:15
Modified
2024-11-21 06:28
Summary
Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2A1CD2-09C0-48DE-9257-6C3126365434",
                     versionEndIncluding: "15.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Bridge versión 11.1.1 (y anteriores) están afectadas por una vulnerabilidad de lectura fuera de los límites al analizar un archivo SGI elaborado, que podría dar lugar a una lectura más allá del final de una estructura de memoria asignada. Un atacante podría aprovechar esta vulnerabilidad para ejecutar código en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso",
      },
   ],
   id: "CVE-2021-42723",
   lastModified: "2024-11-21T06:28:02.693",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-16T22:15:10.827",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/bridge/apsb21-94.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/bridge/apsb21-94.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-25 22:15
Modified
2024-11-21 05:41
Summary
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "500A6F2A-6FE8-4821-878A-20DD42A214E4",
                     versionEndIncluding: "14.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution .",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 14.2 y anteriores, presenta una vulnerabilidad de lectura fuera de límites. Una explotación con éxito podría conllevar a una ejecución de código arbitraria",
      },
   ],
   id: "CVE-2020-9652",
   lastModified: "2024-11-21T05:41:02.133",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-25T22:15:14.117",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-07 13:15
Modified
2024-11-21 06:27
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBB0B918-2D63-45CD-B1F2-9660207DCD9F",
                     versionEndExcluding: "15.4.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C35A95-8F50-4A12-9809-8FE50F1AB75B",
                     versionEndExcluding: "22.1.1",
                     versionStartIncluding: "22.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 22.0 (y anteriores) y 15.4.2 (y anteriores) de Adobe Premiere Pro se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar la divulgación de memoria sensible. Un atacante podría aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.\n",
      },
   ],
   id: "CVE-2021-42265",
   lastModified: "2024-11-21T06:27:29.167",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-07T13:15:07.777",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-08-20 19:15
Modified
2024-11-21 06:12
Summary
Adobe Premiere Pro version 15.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30075EBF-628D-4D90-B751-63DC508E4EC5",
                     versionEndIncluding: "15.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 15.2 (y anteriores), está afectada por una vulnerabilidad de corrupción de memoria cuando analiza un archivo especialmente diseñado. Un atacante no autenticado podría aprovechar esta vulnerabilidad para lograr una ejecución de código arbitrario en el contexto del usuario actual. Una explotación de este problema requiere una interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2021-35997",
   lastModified: "2024-11-21T06:12:55.197",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2021-08-20T19:15:10.367",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-56.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-56.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-788",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-03-18 15:15
Modified
2024-12-04 22:06
Summary
Premiere Pro versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20EDCC65-982D-4AC5-837A-C0185DE70A2E",
                     versionEndExcluding: "23.6.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6E39ED0-A7E1-40F7-B42D-B9CF812FB96D",
                     versionEndExcluding: "24.2.1",
                     versionStartIncluding: "24.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Premiere Pro versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 24.1, 23.6.2 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de escritura fuera de los límites que podría provocar la ejecución de código arbitrario en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2024-20746",
   lastModified: "2024-12-04T22:06:27.610",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-03-18T15:15:41.580",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-13 13:15
Modified
2024-11-21 06:34
Summary
Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "622DC0F9-3997-4597-B27A-D2019EAC4B62",
                     versionEndExcluding: "15.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 15.4 (y anteriores), están afectadas por una vulnerabilidad de corrupción de memoria. Un atacante no autenticado podría aprovechar esta vulnerabilidad para lograr una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario para explotar este problema, ya que la víctima debe abrir un archivo M4A malicioso",
      },
   ],
   id: "CVE-2021-46816",
   lastModified: "2024-11-21T06:34:45.333",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-06-13T13:15:09.843",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-26 20:15
Modified
2024-11-21 05:40
Summary
Adobe Premiere Pro versions 14.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "322B9052-FC0D-4F0A-82DD-75B17348619A",
                     versionEndIncluding: "14.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 14.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 14.1 y anteriores, presenta una vulnerabilidad de lectura fuera de límites. Una explotación con éxito podría conllevar a una divulgación de información",
      },
   ],
   id: "CVE-2020-9616",
   lastModified: "2024-11-21T05:40:58.350",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-26T20:15:12.167",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-27.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-27.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-25 22:15
Modified
2024-11-21 05:41
Summary
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "500A6F2A-6FE8-4821-878A-20DD42A214E4",
                     versionEndIncluding: "14.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 14.2 y anteriores, presenta una vulnerabilidad de escritura fuera de límites. Una explotación con éxito podría conllevar a una ejecución de código arbitraria",
      },
   ],
   id: "CVE-2020-9654",
   lastModified: "2024-11-21T05:41:02.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-25T22:15:14.270",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-10-21 21:15
Modified
2024-11-21 05:14
Summary
Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7CEBD2C-7445-44B6-956C-35D16ADC4A84",
                     versionEndIncluding: "14.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 14.4 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 14.4 (y anteriores) está afectado por un elemento de ruta de búsqueda no controlada que podría resultar en una ejecución de código arbitraria en el contexto del usuario actual.&#xa0;Una explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso",
      },
   ],
   id: "CVE-2020-24424",
   lastModified: "2024-11-21T05:14:47.787",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-10-21T21:15:12.943",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-64.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:27
Summary
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DF3A0A5-984B-461D-AF8F-B8EE2550A9AE",
                     versionEndExcluding: "15.4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro 15.4.1 (y versiones anteriores), está afectado por una vulnerabilidad de desreferencia de puntero Null cuando es analizado un archivo especialmente diseñado. Un atacante no autenticado podría aprovechar esta vulnerabilidad para conseguir una denegación de servicio de la aplicación en el contexto del usuario actual. Es requerida una interacción del usuario para explotar este problema, ya que la víctima debe abrir un archivo malicioso",
      },
   ],
   id: "CVE-2021-42263",
   lastModified: "2024-11-21T06:27:28.900",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-16T15:15:14.590",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-25 22:15
Modified
2024-11-21 05:41
Summary
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "500A6F2A-6FE8-4821-878A-20DD42A214E4",
                     versionEndIncluding: "14.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versiones 14.2 y anteriores, presenta una vulnerabilidad de escritura fuera de límites. Una explotación con éxito podría conllevar a una ejecución de código arbitraria",
      },
   ],
   id: "CVE-2020-9653",
   lastModified: "2024-11-21T05:41:02.240",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-25T22:15:14.193",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb20-38.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-09 19:15
Modified
2024-12-03 14:35
Summary
Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1E4799F-8D36-419C-A3BD-1CD365D59FBF",
                     versionEndExcluding: "23.6.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "034306A8-9B02-4CE1-9F41-B33CA518FCDF",
                     versionEndExcluding: "24.5",
                     versionStartIncluding: "24.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high.",
      },
      {
         lang: "es",
         value: "Las versiones 23.6.5, 24.4.1 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de ruta de búsqueda no confiable que podría provocar la ejecución de código arbitrario. Un atacante podría aprovechar esta vulnerabilidad insertando un archivo malicioso en la ruta de búsqueda, que la aplicación podría ejecutar en lugar del archivo legítimo. Esto podría ocurrir cuando la aplicación utiliza una ruta de búsqueda para localizar ejecutables o bibliotecas. La explotación de este problema requiere la interacción del usuario y la complejidad del ataque es alta.",
      },
   ],
   id: "CVE-2024-34123",
   lastModified: "2024-12-03T14:35:59.150",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-09T19:15:11.493",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-426",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-16 17:15
Modified
2024-11-21 08:29
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 24.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF0FF73-E9FD-4D83-A812-EC45C0638401",
                     versionEndIncluding: "23.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEE067D-6646-43C6-987C-35BB0EF7C3F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 24.0 (y anteriores) y 23.6 (y anteriores) se ven afectados por una vulnerabilidad Use After Free que podría provocar la ejecución de código arbitrario en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2023-47055",
   lastModified: "2024-11-21T08:29:41.413",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-16T17:15:07.267",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-16 17:15
Modified
2024-11-21 08:29
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 24.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF0FF73-E9FD-4D83-A812-EC45C0638401",
                     versionEndIncluding: "23.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEE067D-6646-43C6-987C-35BB0EF7C3F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 24.0 (y anteriores) y 23.6 (y anteriores) se ven afectados por una vulnerabilidad de acceso al puntero no inicializado que podría provocar la divulgación de memoria confidencial. Un atacante podría aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2023-47060",
   lastModified: "2024-11-21T08:29:42.053",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 1.4,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-16T17:15:08.270",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-09-13 09:15
Modified
2024-09-16 13:12
Summary
Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "431578AF-FF5D-4E2D-8458-C67FF84ABE3C",
                     versionEndExcluding: "23.6.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "62DB0CFE-BCDF-4B1D-B77A-361297F15408",
                     versionEndExcluding: "24.6",
                     versionStartIncluding: "24.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 24.5, 23.6.8 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de Use After Free que podría provocar la divulgación de memoria confidencial. Un atacante podría aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2024-39385",
   lastModified: "2024-09-16T13:12:45.600",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-09-13T09:15:07.470",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76DC17D6-C856-4BF8-BD47-7D9DE8CD32E9",
                     versionEndIncluding: "15.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 15.4.1 (y anteriores), está afectado por una vulnerabilidad de corrupción de memoria debido a un manejo no seguro de un archivo malicioso, resultando potencialmente en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario para explotar esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-40794",
   lastModified: "2024-11-21T06:24:48.783",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-16T15:15:14.437",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-788",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-12-10 22:15
Modified
2024-12-13 18:28
Summary
Premiere Pro versions 25.0, 24.6.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 25.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E5841F1-1B0E-462D-B5F6-48BB33533BB8",
                     versionEndExcluding: "24.6.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:25.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C85C8917-5BF6-4381-9A8D-1AA642D7AD60",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Premiere Pro versions 25.0, 24.6.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 25.0, 24.6.3 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de desbordamiento de búfer basado en montón que podría provocar la ejecución de código arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2024-53956",
   lastModified: "2024-12-13T18:28:36.207",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-12-10T22:15:25.767",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-104.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76DC17D6-C856-4BF8-BD47-7D9DE8CD32E9",
                     versionEndIncluding: "15.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 15.4.1 (y anteriores), está afectado por una vulnerabilidad de corrupción de memoria debido a un manejo no seguro de un archivo malicioso, resultando potencialmente en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario para explotar esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-40792",
   lastModified: "2024-11-21T06:24:48.497",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-03-16T15:15:14.327",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-788",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-09-29 16:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
Impacted products
Vendor Product Version
adobe premiere_pro *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D2A1CD2-09C0-48DE-9257-6C3126365434",
                     versionEndIncluding: "15.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 15.4 (y anteriores), está afectada por una vulnerabilidad de corrupción de memoria debida a una administración no segura de un archivo .svg malicioso, resultando potencialmente en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario, ya que la víctima debe abrir un archivo especialmente diseñado para explotar esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-40710",
   lastModified: "2024-11-21T06:24:36.613",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2021-09-29T16:15:11.480",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-788",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-16 17:15
Modified
2024-11-21 08:29
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 24.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF0FF73-E9FD-4D83-A812-EC45C0638401",
                     versionEndIncluding: "23.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEE067D-6646-43C6-987C-35BB0EF7C3F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 24.0 (y anteriores), 23.6 (y anteriores), están afectadas por una vulnerabilidad de desbordamiento del búfer en la región Heap de la memoria que podría resultar en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario para explotar este problema, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2023-47056",
   lastModified: "2024-11-21T08:29:41.540",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-16T17:15:07.510",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-07 13:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBB0B918-2D63-45CD-B1F2-9660207DCD9F",
                     versionEndExcluding: "15.4.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C35A95-8F50-4A12-9809-8FE50F1AB75B",
                     versionEndExcluding: "22.1.1",
                     versionStartIncluding: "22.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 22.0 (y anteriores) y 15.4.2 (y anteriores) de Adobe Premiere Pro se ven afectadas por una vulnerabilidad de lectura fuera de los límites que podría provocar una lectura más allá del final de una estructura de memoria asignada. Un atacante podría aprovechar esta vulnerabilidad para ejecutar código en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.\n",
      },
   ],
   id: "CVE-2021-40795",
   lastModified: "2024-11-21T06:24:48.933",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-07T13:15:07.683",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-117.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76DC17D6-C856-4BF8-BD47-7D9DE8CD32E9",
                     versionEndIncluding: "15.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 15.4.1 (y anteriores), está afectado por una vulnerabilidad de corrupción de memoria debido a un manejo no seguro de un archivo malicioso, resultando potencialmente en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario para explotar esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-40793",
   lastModified: "2024-11-21T06:24:48.647",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-16T15:15:14.380",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-788",
            },
         ],
         source: "psirt@adobe.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:27
Summary
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DF3A0A5-984B-461D-AF8F-B8EE2550A9AE",
                     versionEndExcluding: "15.4.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro 15.4.1 (y anteriores) está afectado por una vulnerabilidad de desreferencia de puntero Null cuando es analizado un archivo especialmente diseñado. Un atacante no autenticado podría aprovechar esta vulnerabilidad para conseguir una denegación de servicio de la aplicación en el contexto del usuario actual. Es requerida una interacción del usuario para explotar este problema, ya que la víctima debe abrir un archivo malicioso",
      },
   ],
   id: "CVE-2021-42264",
   lastModified: "2024-11-21T06:27:29.040",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-03-16T15:15:14.647",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:24
Summary
Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76DC17D6-C856-4BF8-BD47-7D9DE8CD32E9",
                     versionEndIncluding: "15.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro 15.4.1 (y anteriores) está afectado por una vulnerabilidad de desreferencia de puntero Null cuando analiza un archivo especialmente diseñado. Un atacante no autenticado podría aprovechar esta vulnerabilidad para lograr una denegación de servicio de la aplicación en el contexto del usuario actual. Es requerida una interacción del usuario para explotar este problema, ya que la víctima debe abrir un archivo malicioso",
      },
   ],
   id: "CVE-2021-40796",
   lastModified: "2024-11-21T06:24:49.087",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-16T15:15:14.490",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-09-13 09:15
Modified
2024-09-16 13:01
Summary
Premiere Pro versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro *
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "431578AF-FF5D-4E2D-8458-C67FF84ABE3C",
                     versionEndExcluding: "23.6.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "62DB0CFE-BCDF-4B1D-B77A-361297F15408",
                     versionEndExcluding: "24.6",
                     versionStartIncluding: "24.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Premiere Pro versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Las versiones 24.5, 23.6.8 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de escritura fuera de los límites que podría provocar la ejecución de código arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2024-39384",
   lastModified: "2024-09-16T13:01:07.037",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-09-13T09:15:06.620",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-16 17:15
Modified
2024-11-21 08:29
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 24.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF0FF73-E9FD-4D83-A812-EC45C0638401",
                     versionEndIncluding: "23.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEE067D-6646-43C6-987C-35BB0EF7C3F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 24.0 (y anteriores) y 23.6 (y anteriores) se ven afectados por una vulnerabilidad de lectura fuera de los límites al analizar un archivo manipulado, lo que podría dar lugar a una lectura más allá del final de una estructura de memoria asignada. Un atacante podría aprovechar esta vulnerabilidad para ejecutar código en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2023-47058",
   lastModified: "2024-11-21T08:29:41.797",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-16T17:15:07.890",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-16 17:15
Modified
2024-11-21 08:29
Summary
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impacted products
Vendor Product Version
adobe premiere_pro *
adobe premiere_pro 24.0
apple macos -
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF0FF73-E9FD-4D83-A812-EC45C0638401",
                     versionEndIncluding: "23.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:premiere_pro:24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEE067D-6646-43C6-987C-35BB0EF7C3F0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
      },
      {
         lang: "es",
         value: "Adobe Premiere Pro versión 24.0 (y anteriores) y 23.6 (y anteriores) se ven afectados por una vulnerabilidad de lectura fuera de los límites al analizar un archivo manipulado, lo que podría dar lugar a una lectura más allá del final de una estructura de memoria asignada. Un atacante podría aprovechar esta vulnerabilidad para ejecutar código en el contexto del usuario actual. La explotación de este problema requiere la interacción del usuario, ya que la víctima debe abrir un archivo malicioso.",
      },
   ],
   id: "CVE-2023-47059",
   lastModified: "2024-11-21T08:29:41.930",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@adobe.com",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-16T17:15:08.080",
   references: [
      {
         source: "psirt@adobe.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "psirt@adobe.com",
         type: "Primary",
      },
   ],
}