Vulnerabilities (CVE)

Filtered by vendor Adobe Subscribe
Filtered by product Creative Cloud
Total 22 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-26358 1 Adobe 1 Creative Cloud 2023-12-10 N/A 7.8 HIGH
Creative Cloud version 5.9.1 (and earlier) is affected by an Untrusted Search Path vulnerability that might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts.
CVE-2021-28581 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 4.4 MEDIUM 7.3 HIGH
Adobe Creative Cloud Desktop 3.5 (and earlier) is affected by an uncontrolled search path vulnerability that could result in elevation of privileges. Exploitation of this issue requires user interaction in that a victim must log on to the attacker's local machine.
CVE-2020-24422 1 Adobe 1 Creative Cloud 2023-12-10 6.8 MEDIUM 7.8 HIGH
Adobe Creative Cloud Desktop Application version 5.2 (and earlier) and 2.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2020-3808 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 5.8 MEDIUM 5.9 MEDIUM
Creative Cloud Desktop Application versions 5.0 and earlier have a time-of-check to time-of-use (toctou) race condition vulnerability. Successful exploitation could lead to arbitrary file deletion.
CVE-2020-9669 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 7.5 HIGH 9.8 CRITICAL
Adobe Creative Cloud Desktop Application versions 5.1 and earlier have a lack of exploit mitigations vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2019-8236 3 Adobe, Apple, Microsoft 3 Creative Cloud, Macos, Windows 2023-12-10 7.5 HIGH 9.8 CRITICAL
Creative Cloud Desktop Application version 4.6.1 and earlier versions have Security Bypass vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user.
CVE-2019-7958 3 Adobe, Apple, Microsoft 3 Creative Cloud, Mac Os X, Windows 2023-12-10 10.0 HIGH 9.8 CRITICAL
Creative Cloud Desktop Application versions 4.6.1 and earlier have an insecure inherited permissions vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2019-7093 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 6.8 MEDIUM 7.8 HIGH
Creative Cloud Desktop Application (installer) versions 4.7.0.400 and earlier have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2019-7957 3 Adobe, Apple, Microsoft 3 Creative Cloud, Mac Os X, Windows 2023-12-10 5.0 MEDIUM 7.5 HIGH
Creative Cloud Desktop Application versions 4.6.1 and earlier have a security bypass vulnerability. Successful exploitation could lead to denial of service.
CVE-2019-8063 3 Adobe, Apple, Microsoft 3 Creative Cloud, Mac Os X, Windows 2023-12-10 5.0 MEDIUM 7.5 HIGH
Creative Cloud Desktop Application 4.6.1 and earlier versions have an insecure transmission of sensitive data vulnerability. Successful exploitation could lead to information leakage.
CVE-2019-7959 3 Adobe, Apple, Microsoft 3 Creative Cloud, Mac Os X, Windows 2023-12-10 10.0 HIGH 9.8 CRITICAL
Creative Cloud Desktop Application versions 4.6.1 and earlier have a using components with known vulnerabilities vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2018-5003 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 6.8 MEDIUM 7.8 HIGH
Adobe Creative Cloud Desktop Application before 4.5.5.342 (installer) has an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2018-12829 1 Adobe 1 Creative Cloud 2023-12-10 7.5 HIGH 9.8 CRITICAL
Adobe Creative Cloud Desktop Application before 4.6.1 has an improper certificate validation vulnerability. Successful exploitation could lead to privilege escalation.
CVE-2018-4992 1 Adobe 1 Creative Cloud 2023-12-10 4.6 MEDIUM 7.8 HIGH
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper input validation vulnerability. Successful exploitation could lead to local privilege escalation.
CVE-2018-4991 1 Adobe 1 Creative Cloud 2023-12-10 7.5 HIGH 9.8 CRITICAL
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper certificate validation vulnerability. Successful exploitation could lead to a security bypass.
CVE-2018-4873 1 Adobe 1 Creative Cloud 2023-12-10 4.6 MEDIUM 7.8 HIGH
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Unquoted Search Path vulnerability. Successful exploitation could lead to local privilege escalation.
CVE-2017-3007 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 4.6 MEDIUM 7.8 HIGH
Adobe Thor versions 3.9.5.353 and earlier have a vulnerability in the directory search path used to find resources, related to Creative Cloud desktop applications.
CVE-2017-3006 2 Adobe, Microsoft 2 Creative Cloud, Windows 2023-12-10 9.0 HIGH 8.8 HIGH
Adobe Thor versions 3.9.5.353 and earlier have a vulnerability related to the use of improper resource permissions during the installation of Creative Cloud desktop applications.
CVE-2016-1034 1 Adobe 1 Creative Cloud 2023-12-10 9.4 HIGH 9.1 CRITICAL
The Sync Process in the JavaScript API for Creative Cloud Libraries in Adobe Creative Cloud Desktop Application before 3.6.0.244 allows remote attackers to read or write to arbitrary files via unspecified vectors.
CVE-2016-4157 1 Adobe 1 Creative Cloud 2023-12-10 6.9 MEDIUM 7.3 HIGH
Untrusted search path vulnerability in the installer in Adobe Creative Cloud Desktop Application before 3.7.0.272 on Windows allows local users to gain privileges via a Trojan horse resource in an unspecified directory.