Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
digital_editions Vendor: adobe

About This Product

digital_editions is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 71 known vulnerabilities affecting adobe digital_editions. This includes 27 critical-severity issues and 30 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2002 to 2023, indicating a sustained research interest and ongoing security attention. 13 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-1016 2002-10-04 2025-04-03 - 4.6 Unknown
CVE-2002-1017 2002-10-04 2025-04-03 - 2.1 Unknown
CVE-2013-1377 2013-07-31 2025-04-11 - 10.0 Likely
CVE-2014-0494 2014-01-23 2025-04-11 - 10.0 Likely
CVE-2014-8068 2014-10-09 2025-04-12 - 5.0 Likely
CVE-2016-0954 2016-03-09 2025-04-12 9.8 10.0 Likely
CVE-2016-4256 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4257 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4258 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4259 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4260 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4261 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4262 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-4263 2016-09-16 2025-04-12 9.8 10.0 Likely
CVE-2016-6980 2016-09-26 2025-04-12 9.8 10.0 Likely
CVE-2016-7888 2016-12-15 2025-04-12 5.3 5.0 Likely
CVE-2016-7889 2016-12-15 2025-04-12 7.5 5.0 Likely
CVE-2017-2973 2017-02-15 2025-04-20 9.8 10.0 Likely
CVE-2017-2974 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2975 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2976 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2977 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2978 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2979 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2980 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-2981 2017-02-15 2025-04-20 7.5 5.0 Likely
CVE-2017-3088 2017-06-20 2025-04-20 10.0 10.0 Likely
CVE-2017-3089 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3090 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3092 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3093 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3094 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3095 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3096 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-3097 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2017-11272 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11274 2017-08-11 2025-04-20 9.8 10.0 Likely
CVE-2017-11275 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11276 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11277 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11278 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11279 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11280 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-3091 2017-08-11 2025-04-20 7.5 5.0 Likely
CVE-2017-11273 2017-12-09 2025-04-20 5.5 4.3 Likely
CVE-2017-11297 2017-12-09 2025-04-20 5.3 5.0 Likely
CVE-2017-11298 2017-12-09 2025-04-20 5.3 5.0 Likely
CVE-2017-11299 2017-12-09 2025-04-20 5.3 5.0 Likely
CVE-2017-11300 2017-12-09 2025-04-20 5.3 5.0 Likely
CVE-2017-11301 2017-12-09 2025-04-20 5.3 5.0 Likely
CVE-2018-4925 2018-05-19 2024-11-21 7.5 5.0 Likely
CVE-2018-4926 2018-05-19 2024-11-21 5.5 4.3 Likely
CVE-2018-12813 2018-10-17 2024-11-21 9.8 10.0 Likely
CVE-2018-12814 2018-10-17 2024-11-21 9.8 10.0 Likely
CVE-2018-12816 2018-10-17 2024-11-21 7.5 5.0 Likely
CVE-2018-12818 2018-10-17 2024-11-21 7.5 5.0 Likely
CVE-2018-12819 2018-10-17 2024-11-21 7.5 5.0 Likely
CVE-2018-12820 2018-10-17 2024-11-21 7.5 5.0 Likely
CVE-2018-12821 2018-10-17 2024-11-21 7.5 5.0 Likely
CVE-2018-12822 2018-10-17 2024-11-21 9.8 10.0 Likely
CVE-2018-12823 2018-10-17 2024-11-21 9.8 10.0 Likely
CVE-2018-12817 2019-01-18 2024-11-21 7.5 5.0 Likely
CVE-2019-7095 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2020-3759 2020-02-13 2024-11-21 7.5 5.0 Likely
CVE-2020-3760 2020-02-13 2024-11-21 9.8 10.0 Likely
CVE-2020-3798 2020-06-26 2024-11-21 6.5 4.3 Likely
CVE-2021-21100 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-39826 2021-09-27 2024-11-21 8.6 9.3 Likely
CVE-2021-39827 2021-09-27 2024-11-21 6.5 6.8 Likely
CVE-2021-39828 2021-09-27 2024-11-21 5.8 6.8 Likely
CVE-2023-21582 2023-04-12 2024-11-21 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe digital_editions by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.