📦 Illustrator
by Adobe
🔍 What is Illustrator?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This CVE describes an untrusted search path vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. Attackers can manipulate the search path to...
This CVE describes an out-of-bounds write vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. Attackers could gain the same privileges as t...
A heap-based buffer overflow vulnerability in Adobe Illustrator allows attackers to execute arbitrary code when a user opens a malicious file. This affects users running Illustrator versions 28.7.10, ...
This CVE describes an out-of-bounds write vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. Attackers could gain control of the affected ...
A stack-based buffer overflow vulnerability in Adobe Illustrator allows arbitrary code execution when a user opens a malicious file. This affects Illustrator versions 28.7.8, 29.6.1 and earlier. Attac...
This CVE describes an integer underflow vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. It affects Illustrator versions 28.7.6, 29.5.1,...
Adobe Illustrator versions 28.7.6, 29.5.1 and earlier contain an out-of-bounds write vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects all users ...
A stack-based buffer overflow vulnerability in Adobe Illustrator allows arbitrary code execution when a user opens a malicious file. This affects Illustrator versions 28.7.6, 29.5.1 and earlier. Attac...
Adobe Illustrator versions 28.7.6, 29.5.1 and earlier contain an out-of-bounds write vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects all users ...
A heap-based buffer overflow vulnerability in Adobe Illustrator allows attackers to execute arbitrary code when a user opens a malicious file. This affects users running Illustrator versions 29.3, 28....
Adobe Illustrator versions 29.1, 28.7.3 and earlier contain an integer underflow vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects all users runn...
A stack-based buffer overflow vulnerability in Adobe Illustrator allows attackers to execute arbitrary code when a user opens a malicious file. This affects users running Illustrator versions 29.1, 28...
Adobe Illustrator versions 29.1, 28.7.3 and earlier contain a use-after-free vulnerability that could allow attackers to execute arbitrary code when a user opens a malicious file. This affects all use...
Adobe Illustrator versions 29.0.0, 28.7.2 and earlier contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code on a victim's system. This requires user interac...
Adobe Illustrator versions 28.7.1 and earlier contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code when a user opens a malicious file. This affects all use...
Adobe Illustrator versions 28.7.1 and earlier contain a heap-based buffer overflow vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects all users ru...
Adobe Illustrator versions 28.6, 27.9.5 and earlier contain an integer underflow vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects all users runn...
Adobe Illustrator versions 28.6, 27.9.5 and earlier contain an integer overflow vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects all users runni...
Adobe Illustrator versions 28.5, 27.9.4, 28.6, 27.9.5 and earlier contain an improper input validation vulnerability that could allow arbitrary code execution when a user opens a malicious file. This ...
Adobe Illustrator versions 28.5, 27.9.4 and earlier contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code on a victim's system. This affects users who open ...
This CVE describes a Use After Free vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. The vulnerability affects Illustrator versions 28.4...
This CVE describes an out-of-bounds write vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. Attackers could exploit this to run code with...
A stack-based buffer overflow vulnerability in Adobe Illustrator allows arbitrary code execution when a user opens a malicious file. This affects users running vulnerable versions of Illustrator, pote...
Adobe Illustrator versions 28.0 and earlier (and 27.9 and earlier) contain an out-of-bounds read vulnerability when parsing malicious files. This could allow an attacker to execute arbitrary code with...
This CVE describes an out-of-bounds write vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. Attackers could gain control of the affected ...
CVE-2022-30642 is an out-of-bounds write vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. This affects users of Adobe Illustrator versio...
This CVE describes a use-after-free vulnerability in Adobe Illustrator that could allow an attacker to execute arbitrary code on a victim's system. The vulnerability affects users of Adobe Illustrator...
CVE-2023-25859 is an improper input validation vulnerability in Adobe Illustrator that allows arbitrary code execution when a user opens a malicious file. This affects Illustrator users on versions 26...
CVE-2023-25861 is an out-of-bounds write vulnerability in Adobe Illustrator that could allow arbitrary code execution when a user opens a malicious file. This affects Illustrator versions 26.5.2 and e...
CVE-2022-30647 is a use-after-free vulnerability in Adobe Illustrator that could allow an attacker to execute arbitrary code on a victim's system when they open a malicious file. This affects users of...
This CVE describes an out-of-bounds write vulnerability in Adobe Illustrator that could allow an attacker to execute arbitrary code on a victim's system. The vulnerability affects users of Adobe Illus...
Adobe Illustrator versions 26.0.3 and earlier contain a buffer overflow vulnerability that allows arbitrary code execution when a user opens a maliciously crafted file. This affects all users running ...
Adobe Illustrator versions 25.4.3 and earlier and 26.0.2 and earlier contain a buffer overflow vulnerability when processing malicious files. This could allow attackers to execute arbitrary code with ...
CVE-2021-21104 is a memory corruption vulnerability in Adobe Illustrator that allows remote code execution when a user opens a malicious file. Attackers can execute arbitrary code with the privileges ...
CVE-2021-36009 is a memory corruption vulnerability in Adobe Illustrator that allows arbitrary code execution when a user opens a malicious file. Attackers can exploit this to run code with the victim...
CVE-2021-36011 is a command injection vulnerability in Adobe Illustrator that allows arbitrary code execution when chained with a JavaScript debugging tool. Attackers can exploit this by tricking user...
CVE-2021-28591 is an out-of-bounds write vulnerability in Adobe Illustrator that allows arbitrary code execution when a malicious file is opened. Attackers can exploit this to run code with the victim...
CVE-2021-21102 is a path traversal vulnerability in Adobe Illustrator that allows arbitrary code execution when a malicious file is opened. Attackers can exploit this to run code with the victim's use...
Adobe Illustrator versions 29.8.3, 30.0 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. This...
Adobe Illustrator versions 28.7.8, 29.6.1 and earlier contain a use-after-free vulnerability that could allow attackers to read sensitive memory contents. This affects users who open malicious Illustr...
Adobe Illustrator versions 28.7.6, 29.5.1 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. Th...
Adobe Illustrator versions 28.7.1 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents. This could potentially bypass security mitigatio...
Adobe Illustrator versions 28.7.1 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents. This could potentially bypass security mitigatio...
Adobe Illustrator versions 28.6, 27.9.5 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. This...
Adobe Illustrator versions 28.5, 27.9.4 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents when users open malicious files. This could...
Adobe Illustrator versions 28.5, 27.9.4 and earlier contain a NULL pointer dereference vulnerability that allows attackers to crash the application by tricking users into opening malicious files. This...