Filtered by vendor Adobe
Subscriptions
Filtered by product Digital Editions
Subscriptions
Total
71 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2016-4256 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | ||||
CVE-2016-7888 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions versions 4.5.2 and earlier has an important vulnerability that could lead to memory address leak. | ||||
CVE-2016-0954 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | ||||
CVE-2016-4258 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4259, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | ||||
CVE-2016-4262 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, and CVE-2016-4261. | ||||
CVE-2016-4263 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Use-after-free vulnerability in Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code via unspecified vectors. | ||||
CVE-2016-4257 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | ||||
CVE-2014-8068 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions (DE) 4 does not use encryption for transmission of data to adelogs.adobe.com, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by book-navigation information. | ||||
CVE-2016-4261 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4260, and CVE-2016-4262. | ||||
CVE-2016-4259 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4260, CVE-2016-4261, and CVE-2016-4262. | ||||
CVE-2016-4260 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4256, CVE-2016-4257, CVE-2016-4258, CVE-2016-4259, CVE-2016-4261, and CVE-2016-4262. | ||||
CVE-2016-6980 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Use-after-free vulnerability in Adobe Digital Editions before 4.5.2 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4263. | ||||
CVE-2016-7889 | 1 Adobe | 1 Digital Editions | 2025-04-12 | N/A |
Adobe Digital Editions versions 4.5.2 and earlier has an issue with parsing crafted XML entries that could lead to information disclosure. | ||||
CVE-2013-1377 | 1 Adobe | 1 Digital Editions | 2025-04-11 | N/A |
Adobe Digital Editions 2.x before 2.0.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | ||||
CVE-2014-0494 | 1 Adobe | 1 Digital Editions | 2025-04-11 | N/A |
Adobe Digital Editions 2.0.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors. | ||||
CVE-2002-1016 | 1 Adobe | 1 Digital Editions | 2025-04-03 | N/A |
Adobe eBook Reader allows a user to bypass restrictions for copy, print, lend, and give operations by backing up key data files, performing the operations, and restoring the original data files. | ||||
CVE-2002-1017 | 1 Adobe | 1 Digital Editions | 2025-04-03 | N/A |
Adobe eBook Reader 2.1 and 2.2 allows a user to copy eBooks to other systems by using the backup feature, capturing the encryption Challenge, and using the appropriate hash function to generate the activation code. | ||||
CVE-2023-21582 | 1 Adobe | 1 Digital Editions | 2025-03-05 | 7.8 High |
Adobe Digital Editions version 4.5.11.187303 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2021-39828 | 2 Adobe, Apple | 2 Digital Editions, Macos | 2024-11-21 | 5.8 Medium |
Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by a privilege escalation vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability. | ||||
CVE-2021-39827 | 2 Adobe, Apple | 2 Digital Editions, Macos | 2024-11-21 | 6.5 Medium |
Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary file write vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to write an arbitrary file to the system. User interaction is required before product installation to abuse this vulnerability. |