Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
photoshop Vendor: adobe

About This Product

photoshop is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 91 known vulnerabilities affecting adobe photoshop. This includes 2 critical-severity issues and 73 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2005 to 2025, indicating a sustained research interest and ongoing security attention. 14 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-0151 2005-06-13 2025-04-03 - 7.5 Likely
CVE-2006-0525 2006-02-02 2025-04-03 - 4.6 Unknown
CVE-2007-2244 2007-04-25 2025-04-09 - 9.3 Likely
CVE-2007-2365 2007-04-30 2025-04-09 - 9.3 Likely
CVE-2008-1765 2008-04-23 2025-04-09 - 9.3 Likely
CVE-2010-3127 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2011-2164 2011-05-20 2025-04-11 - 10.0 Likely
CVE-2011-2131 2011-08-11 2025-04-11 - 9.3 Likely
CVE-2012-2027 2012-05-09 2025-04-11 - 9.3 Likely
CVE-2012-2028 2012-05-09 2025-04-11 - 9.3 Likely
CVE-2017-11303 2017-12-09 2025-04-20 9.8 7.5 Likely
CVE-2017-11304 2017-12-09 2025-04-20 9.8 7.5 Likely
CVE-2020-9683 2020-07-22 2024-11-21 8.8 6.8 Likely
CVE-2020-9684 2020-07-22 2024-11-21 8.8 6.8 Likely
CVE-2020-9685 2020-07-22 2024-11-21 8.8 6.8 Likely
CVE-2020-9686 2020-07-22 2024-11-21 6.5 4.3 Likely
CVE-2020-9687 2020-07-22 2024-11-21 8.8 6.8 Likely
CVE-2020-24420 2020-10-21 2024-11-21 7.0 6.9 Unknown
CVE-2021-21006 2021-01-13 2024-11-21 8.6 6.8 Likely
CVE-2021-21047 2021-02-11 2024-11-21 7.8 9.3 Likely
CVE-2021-21048 2021-02-11 2024-11-21 7.8 9.3 Likely
CVE-2021-21049 2021-02-11 2024-11-21 7.8 9.3 Likely
CVE-2021-21050 2021-02-11 2024-11-21 7.8 9.3 Likely
CVE-2021-21051 2021-02-11 2024-11-21 7.8 9.3 Likely
CVE-2021-21082 2021-03-12 2024-11-21 7.8 6.8 Likely
CVE-2021-28548 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-28549 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-36005 2021-08-20 2024-11-21 7.8 9.3 Likely
CVE-2021-36006 2021-08-20 2024-11-21 3.3 4.3 Likely
CVE-2021-36065 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36066 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2022-23203 2022-02-16 2024-11-21 7.8 6.8 Likely
CVE-2022-24090 2022-03-11 2024-11-21 5.5 4.3 Likely
CVE-2022-23205 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-24098 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-24099 2022-05-06 2024-11-21 3.3 4.3 Likely
CVE-2022-24105 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28270 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28271 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28272 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28273 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28274 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28275 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28276 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28277 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28278 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2022-28279 2022-05-06 2024-11-21 7.8 9.3 Likely
CVE-2021-42735 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2022-34243 2022-07-15 2024-11-21 7.8 - -
CVE-2022-34244 2022-07-15 2024-11-21 5.5 - -
CVE-2022-35713 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38426 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38427 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38428 2022-09-16 2024-11-21 5.5 - -
CVE-2022-38429 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38430 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38431 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38432 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38433 2022-09-16 2024-11-21 7.8 - -
CVE-2022-38434 2022-09-16 2024-11-21 7.8 - -
CVE-2023-21574 2023-02-17 2024-11-21 7.8 - -
CVE-2023-21575 2023-02-17 2024-11-21 7.8 - -
CVE-2023-21576 2023-02-17 2024-11-21 7.8 - -
CVE-2023-21577 2023-02-17 2024-11-21 5.5 - -
CVE-2023-21578 2023-02-17 2024-11-21 5.5 - -
CVE-2023-25908 2023-03-27 2024-11-21 7.8 - -
CVE-2021-42734 2023-09-07 2024-11-21 5.5 - -
CVE-2021-43018 2023-09-07 2024-11-21 7.8 - -
CVE-2023-44330 2023-11-16 2024-11-21 7.8 - -
CVE-2023-44331 2023-11-16 2024-11-21 5.5 - -
CVE-2023-44332 2023-11-16 2024-11-21 5.5 - -
CVE-2023-44333 2023-11-16 2024-11-21 5.5 - -
CVE-2023-44334 2023-11-16 2024-11-21 5.5 - -
CVE-2023-44335 2023-11-16 2024-11-21 5.5 - -
CVE-2024-20770 2024-04-10 2024-12-05 5.5 - -
CVE-2024-20753 2024-06-13 2024-11-21 7.8 - -
CVE-2024-34117 2024-08-14 2024-08-19 7.8 - -
CVE-2024-43756 2024-09-13 2024-09-13 7.8 - -
CVE-2024-43760 2024-09-13 2024-09-13 7.8 - -
CVE-2024-45108 2024-09-13 2024-09-13 7.8 - -
CVE-2024-45109 2024-09-13 2024-09-13 7.8 - -
CVE-2024-49514 2024-11-12 2024-11-18 7.8 - -
CVE-2024-52997 2024-12-10 2024-12-18 7.8 - -
CVE-2025-21122 2025-01-14 2025-02-11 7.8 - -
CVE-2025-21127 2025-01-14 2025-02-11 7.8 - -
CVE-2025-27198 2025-04-08 2025-05-05 7.8 - -
CVE-2025-30324 2025-05-13 2025-05-22 7.8 - -
CVE-2025-30325 2025-05-13 2025-05-22 7.8 - -
CVE-2025-30326 2025-05-13 2025-05-15 7.8 - -
CVE-2025-49570 2025-08-12 2025-08-14 7.8 - -
CVE-2025-61819 2025-11-11 2025-11-12 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe photoshop by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.