Vulnerabilities (CVE)

Filtered by CWE-119
Total 12220 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-40793 3 Adobe, Apple, Microsoft 3 Premiere Pro, Macos, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40792 3 Adobe, Apple, Microsoft 3 Premiere Pro, Macos, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40787 3 Adobe, Apple, Microsoft 3 Premiere Elements, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40786 3 Adobe, Apple, Microsoft 3 Premiere Elements, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40784 2 Adobe, Microsoft 2 Premiere Rush, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40783 2 Adobe, Microsoft 2 Premiere Rush, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40780 3 Adobe, Apple, Microsoft 3 Media Encoder, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40779 3 Adobe, Apple, Microsoft 3 Media Encoder, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40777 3 Adobe, Apple, Microsoft 3 Media Encoder, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40775 2 Adobe, Microsoft 2 Prelude, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40772 2 Adobe, Microsoft 2 Prelude, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40771 2 Adobe, Microsoft 2 Prelude, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40770 2 Adobe, Microsoft 2 Prelude, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40765 3 Adobe, Apple, Microsoft 3 Character Animator, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40764 3 Adobe, Apple, Microsoft 3 Character Animator, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40763 3 Adobe, Apple, Microsoft 3 Character Animator, Macos, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-40760 2 Adobe, Microsoft 2 After Effects, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40759 2 Adobe, Microsoft 2 After Effects, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40758 2 Adobe, Microsoft 2 After Effects, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40757 2 Adobe, Microsoft 2 After Effects, Windows 2024-11-21 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.