Product:

Bridge

(Adobe)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 137
Date Id Summary Products Score Patch Annotated
2020-06-26 CVE-2020-9564 Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . Bridge 7.8
2020-06-26 CVE-2020-9565 Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . Bridge 7.8
2020-06-26 CVE-2020-9566 Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . Bridge 7.8
2020-06-26 CVE-2020-9567 Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . Bridge 7.8
2020-06-26 CVE-2020-9568 Adobe Bridge versions 10.0.1 and earlier version have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . Bridge 7.8
2020-06-26 CVE-2020-9569 Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . Bridge 7.8
2020-07-22 CVE-2020-9674 Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. Bridge 7.8
2020-07-22 CVE-2020-9675 Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution. Bridge 7.8
2020-07-22 CVE-2020-9676 Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. Bridge 7.8
2025-04-08 CVE-2025-27193 Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Bridge 7.8