Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
experience_manager_cloud_service Vendor: adobe

About This Product

experience_manager_cloud_service is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 183 known vulnerabilities affecting adobe experience_manager_cloud_service. This includes 2 critical-severity issues and 7 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2023, indicating a recent active security attention. 173 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-24445 2020-12-10 2024-11-21 9.0 3.5 Unknown
CVE-2021-21083 2021-06-28 2024-11-21 7.5 5.0 Likely
CVE-2021-21084 2021-06-28 2024-11-21 7.3 4.3 Likely
CVE-2021-40722 2022-01-13 2024-11-21 9.8 7.5 Likely
CVE-2021-43761 2022-01-13 2024-11-21 8.0 3.5 Unknown
CVE-2021-43762 2022-01-13 2024-11-21 6.5 6.4 Likely
CVE-2021-43764 2022-01-13 2024-11-21 8.0 3.5 Unknown
CVE-2021-43765 2022-01-13 2024-11-21 8.1 4.3 Likely
CVE-2021-44176 2022-01-13 2024-11-21 8.1 4.3 Likely
CVE-2021-44177 2022-01-13 2024-11-21 8.1 4.3 Likely
CVE-2021-44178 2022-01-13 2024-11-21 5.4 4.3 Likely
CVE-2022-38438 2022-09-23 2024-11-21 5.4 - -
CVE-2022-38439 2022-09-23 2024-11-21 5.4 - -
CVE-2022-35694 2022-12-16 2024-11-21 5.4 - -
CVE-2022-35696 2022-12-16 2024-11-21 5.4 - -
CVE-2022-42351 2022-12-16 2024-11-21 4.3 - -
CVE-2022-42360 2022-12-16 2024-11-21 5.4 - -
CVE-2022-42366 2022-12-16 2024-11-21 5.4 - -
CVE-2022-42367 2022-12-16 2024-11-21 5.4 - -
CVE-2022-44462 2022-12-16 2024-11-21 5.4 - -
CVE-2022-44468 2022-12-16 2024-11-21 5.4 - -
CVE-2022-44469 2022-12-16 2024-11-21 5.4 - -
CVE-2022-44473 2022-12-16 2024-11-21 5.4 - -
CVE-2022-30679 2022-12-19 2024-11-21 5.4 - -
CVE-2022-35693 2022-12-19 2024-11-21 5.4 - -
CVE-2022-35695 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42345 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42346 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42348 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42349 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42350 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42352 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42354 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42356 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42357 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42362 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42364 2022-12-19 2024-11-21 5.4 - -
CVE-2022-42365 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44463 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44465 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44466 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44467 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44470 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44471 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44474 2022-12-19 2024-11-21 5.4 - -
CVE-2022-44488 2022-12-19 2024-11-21 3.5 - -
CVE-2022-44510 2022-12-22 2024-11-21 5.4 - -
CVE-2023-21615 2023-03-22 2024-11-21 5.4 - -
CVE-2023-21616 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22252 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22253 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22254 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22256 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22257 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22258 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22259 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22260 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22261 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22262 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22263 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22264 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22265 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22266 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22269 2023-03-22 2024-11-21 5.4 - -
CVE-2023-22271 2023-03-22 2024-11-21 5.3 - -
CVE-2023-29302 2023-06-15 2024-11-21 5.4 - -
CVE-2023-29304 2023-06-15 2024-11-21 5.4 - -
CVE-2023-29307 2023-06-15 2024-11-21 5.4 - -
CVE-2023-29322 2023-06-15 2024-11-21 5.4 - -
CVE-2023-38215 2023-09-13 2024-11-21 5.4 - -
CVE-2023-48444 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48445 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48446 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48447 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48448 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48449 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48450 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48451 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48452 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48453 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48454 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48455 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48456 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48457 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48458 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48459 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48460 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48461 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48462 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48463 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48464 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48465 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48466 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48467 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48468 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48469 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48470 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48471 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48472 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48473 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48474 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48475 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48476 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48477 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48478 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48479 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48480 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48481 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48482 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48483 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48484 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48485 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48486 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48487 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48488 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48489 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48490 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48491 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48492 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48493 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48494 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48495 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48496 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48497 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48498 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48499 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48500 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48501 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48502 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48503 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48504 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48505 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48506 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48507 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48508 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48509 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48510 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48511 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48512 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48513 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48514 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48515 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48516 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48517 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48518 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48519 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48520 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48521 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48522 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48523 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48524 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48525 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48526 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48527 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48528 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48529 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48530 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48531 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48532 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48533 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48534 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48535 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48536 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48537 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48538 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48539 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48540 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48541 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48542 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48543 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48544 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48545 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48546 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48547 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48548 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48549 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48550 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48551 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48552 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48553 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48554 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48555 2023-12-15 2024-11-21 5.4 - -
CVE-2023-48556 2023-12-15 2024-11-21 5.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe experience_manager_cloud_service by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.