Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
air_desktop_runtime Vendor: adobe

About This Product

air_desktop_runtime is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 88 known vulnerabilities affecting adobe air_desktop_runtime. This includes 7 critical-severity issues and 81 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2014 to 2016, indicating a recent active security attention.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-0564 2014-10-15 2025-04-12 - 10.0 Likely
CVE-2014-0569 2014-10-15 2025-04-12 - 9.3 Likely
CVE-2016-0964 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0965 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0966 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0967 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0968 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0969 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0970 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0971 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0972 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0973 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0974 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0975 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0976 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0977 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0978 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0979 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0980 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0981 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0982 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0983 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2016-0984 2016-02-10 2025-10-22 8.8 9.3 Likely
CVE-2016-0985 2016-02-10 2025-04-12 8.8 9.3 Likely
CVE-2015-8652 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8653 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8654 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8655 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8656 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8657 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8658 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8820 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8821 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2015-8822 2016-03-04 2025-04-12 8.8 9.3 Likely
CVE-2016-0960 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0961 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0962 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0963 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0986 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0987 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0988 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0989 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0990 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0991 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0992 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0993 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0994 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0995 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0996 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0997 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0998 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-0999 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-1000 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-1001 2016-03-12 2025-04-12 8.8 6.8 Likely
CVE-2016-1002 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-1005 2016-03-12 2025-04-12 8.8 9.3 Likely
CVE-2016-1010 2016-03-12 2025-10-22 8.8 9.3 Likely
CVE-2016-1019 2016-04-07 2025-11-17 9.8 10.0 Likely
CVE-2016-1006 2016-04-09 2025-04-12 8.1 5.8 Likely
CVE-2016-1011 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1012 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1013 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1014 2016-04-09 2025-04-12 7.3 6.9 Unknown
CVE-2016-1015 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1016 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1017 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1018 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1020 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1021 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1022 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1023 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1024 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1025 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1026 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1027 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1028 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1029 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1030 2016-04-09 2025-04-12 8.1 5.8 Likely
CVE-2016-1031 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1032 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-1033 2016-04-09 2025-04-12 8.8 9.3 Likely
CVE-2016-4120 2016-06-16 2025-04-12 9.8 7.5 Likely
CVE-2016-4121 2016-06-16 2025-04-12 9.8 7.5 Likely
CVE-2016-4126 2016-06-16 2025-04-12 8.8 9.3 Likely
CVE-2016-4160 2016-06-16 2025-04-12 9.8 7.5 Likely
CVE-2016-4161 2016-06-16 2025-04-12 9.8 7.5 Likely
CVE-2016-4162 2016-06-16 2025-04-12 9.8 7.5 Likely
CVE-2016-4163 2016-06-16 2025-04-12 9.8 7.5 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe air_desktop_runtime by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.