Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
framemaker Vendor: adobe

About This Product

framemaker is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 107 known vulnerabilities affecting adobe framemaker. This includes 1 critical-severity issue and 84 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 1996 to 2025, indicating a sustained research interest and ongoing security attention. 16 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0133 1996-08-14 2025-04-03 - 2.1 Unknown
CVE-2018-15974 2018-10-17 2024-11-21 7.8 6.8 Likely
CVE-2020-3720 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3721 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3722 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3723 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3724 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3725 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3726 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3727 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3728 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3729 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3730 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3731 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3732 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3733 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3734 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3735 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3736 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3737 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3738 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3739 2020-02-13 2024-11-21 8.8 6.8 Likely
CVE-2020-3740 2020-02-13 2024-11-21 9.8 10.0 Likely
CVE-2020-9634 2020-06-12 2024-11-21 8.8 6.8 Likely
CVE-2020-9635 2020-06-12 2024-11-21 8.8 6.8 Likely
CVE-2020-9636 2020-06-12 2024-11-21 8.8 6.8 Likely
CVE-2020-9725 2020-09-10 2024-11-21 7.8 6.8 Likely
CVE-2020-9726 2020-09-10 2024-11-21 6.1 5.8 Likely
CVE-2021-21056 2021-03-12 2024-11-21 7.8 9.3 Likely
CVE-2021-28596 2021-08-23 2024-11-21 7.8 9.3 Likely
CVE-2021-39829 2021-09-29 2024-11-21 7.8 6.8 Likely
CVE-2021-39830 2021-09-29 2024-11-21 7.8 6.8 Likely
CVE-2021-39831 2021-09-29 2024-11-21 7.8 6.8 Likely
CVE-2021-39832 2021-09-29 2024-11-21 7.8 6.8 Likely
CVE-2021-39833 2021-09-29 2024-11-21 3.3 4.3 Likely
CVE-2021-39834 2021-09-29 2024-11-21 3.3 4.3 Likely
CVE-2021-39835 2021-09-29 2024-11-21 4.3 4.3 Likely
CVE-2021-39862 2021-09-29 2024-11-21 3.3 4.3 Likely
CVE-2021-39865 2021-09-29 2024-11-21 3.3 4.3 Likely
CVE-2021-40697 2021-09-29 2024-11-21 3.3 4.3 Likely
CVE-2022-28821 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28822 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28823 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28824 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28825 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28826 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28827 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28828 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28829 2022-05-13 2024-11-21 7.8 9.3 Likely
CVE-2022-28830 2022-05-13 2024-11-21 5.5 4.3 Likely
CVE-2022-34264 2022-08-11 2024-11-21 5.5 - -
CVE-2022-35673 2022-08-11 2024-11-21 7.8 - -
CVE-2022-35674 2022-08-11 2024-11-21 7.8 - -
CVE-2022-35675 2022-08-11 2024-11-21 7.8 - -
CVE-2022-35676 2022-08-11 2024-11-21 7.8 - -
CVE-2022-35677 2022-08-11 2024-11-21 7.8 - -
CVE-2023-21584 2023-02-17 2024-11-21 5.5 - -
CVE-2023-21619 2023-02-17 2024-11-21 7.8 - -
CVE-2023-21620 2023-02-17 2024-11-21 5.5 - -
CVE-2023-21621 2023-02-17 2024-11-21 7.8 - -
CVE-2023-21622 2023-02-17 2024-11-21 7.8 - -
CVE-2024-30283 2024-05-16 2024-12-02 5.5 - -
CVE-2024-30286 2024-05-16 2024-12-02 5.5 - -
CVE-2024-30287 2024-05-16 2024-12-02 5.5 - -
CVE-2024-30288 2024-05-16 2024-12-02 7.8 - -
CVE-2024-30289 2024-05-16 2024-12-02 7.8 - -
CVE-2024-30290 2024-05-16 2024-12-02 7.8 - -
CVE-2024-30291 2024-05-16 2024-12-02 7.8 - -
CVE-2024-30292 2024-05-16 2024-12-02 7.8 - -
CVE-2024-47421 2024-10-09 2024-10-18 7.8 - -
CVE-2024-47422 2024-10-09 2024-10-18 7.8 - -
CVE-2024-47423 2024-10-09 2024-10-18 7.8 - -
CVE-2024-47424 2024-10-09 2024-10-18 7.8 - -
CVE-2024-47425 2024-10-09 2024-10-18 7.8 - -
CVE-2024-53959 2024-12-10 2024-12-13 7.8 - -
CVE-2025-30295 2025-04-08 2025-04-11 7.8 - -
CVE-2025-30296 2025-04-08 2025-04-11 7.8 - -
CVE-2025-30297 2025-04-08 2025-04-11 7.8 - -
CVE-2025-30298 2025-04-08 2025-04-11 7.8 - -
CVE-2025-30299 2025-04-08 2025-04-11 7.8 - -
CVE-2025-30300 2025-04-08 2025-04-11 5.5 - -
CVE-2025-30301 2025-04-08 2025-04-11 5.5 - -
CVE-2025-30302 2025-04-08 2025-04-11 5.5 - -
CVE-2025-30303 2025-04-08 2025-04-11 5.5 - -
CVE-2025-30304 2025-04-08 2025-04-11 7.8 - -
CVE-2025-47119 2025-07-08 2025-07-10 5.5 - -
CVE-2025-47120 2025-07-08 2025-07-10 5.5 - -
CVE-2025-47121 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47122 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47123 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47124 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47125 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47126 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47127 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47128 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47129 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47130 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47131 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47132 2025-07-08 2025-07-10 7.8 - -
CVE-2025-47133 2025-07-08 2025-07-10 7.8 - -
CVE-2025-54229 2025-08-12 2025-08-14 7.8 - -
CVE-2025-54230 2025-08-12 2025-08-14 7.8 - -
CVE-2025-54231 2025-08-12 2025-08-14 7.8 - -
CVE-2025-54232 2025-08-12 2025-08-14 7.8 - -
CVE-2025-54233 2025-08-12 2025-08-14 5.5 - -
CVE-2025-54281 2025-10-14 2025-10-17 7.8 - -
CVE-2025-54282 2025-10-14 2025-10-17 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe framemaker by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.