Adobe threat watch

Adobe product CVE coverage from NVD — Acrobat, Photoshop, Commerce/Magento, and Creative Cloud components.

Vendor watch hub

What this page covers

The Adobewatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Adobe activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

128

Active

77

Featured

85

Unique CVEs

20

Most recent entry

Apr 14, 2026, 6:16 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Adobe watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

framemaker vulnerability (CVE-2026-27298)

HIGH
watchNVDCVE-2026-27298

Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

framemaker vulnerability (CVE-2026-27297)

HIGH
watchNVDCVE-2026-27297

Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

framemaker vulnerability (CVE-2026-27296)

HIGH
watchNVDCVE-2026-27296

Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

framemaker vulnerability (CVE-2026-27295)

HIGH
watchNVDCVE-2026-27295

Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

framemaker vulnerability (CVE-2026-27294)

HIGH
watchNVDCVE-2026-27294

Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

framemaker vulnerability (CVE-2026-27293)

HIGH
watchNVDCVE-2026-27293

Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

framemaker vulnerability (CVE-2026-27292)

HIGH
watchNVDCVE-2026-27292

Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 6:16 PMOfficial source

incopy vulnerability (CVE-2026-34631)

HIGH
watchNVDCVE-2026-34631

InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 5:16 PMOfficial source

coldfusion vulnerability (CVE-2026-34619)

HIGH
watchNVDCVE-2026-34619

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access unauthorized files or directories outside the intended restrictions. Exploitation of this issue does not require user interaction.

Apr 14, 2026, 5:16 PMOfficial source

coldfusion vulnerability (CVE-2026-27306)

HIGH
watchNVDCVE-2026-27306

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Attacker requires elevated privileges. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 5:16 PMOfficial source

coldfusion vulnerability (CVE-2026-27305)

HIGH
watchNVDCVE-2026-27305

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files and directories outside the intended access scope. Exploitation of this issue does not require user interaction.

Apr 14, 2026, 5:16 PMOfficial source

coldfusion vulnerability (CVE-2026-27304)

CRITICAL
watchNVDCVE-2026-27304

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.

Apr 14, 2026, 5:16 PMOfficial source

coldfusion vulnerability (CVE-2026-27282)

HIGH
watchNVDCVE-2026-27282

ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction.

Apr 14, 2026, 5:16 PMOfficial source

incopy vulnerability (CVE-2026-27287)

HIGH
watchNVDCVE-2026-27287

InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 4:16 PMOfficial source

bridge vulnerability (CVE-2026-34630)

HIGH
watchNVDCVE-2026-34630

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 3:16 PMOfficial source

illustrator vulnerability (CVE-2026-34618)

HIGH
watchNVDCVE-2026-34618

Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 3:16 PMOfficial source

bridge vulnerability (CVE-2026-27313)

HIGH
watchNVDCVE-2026-27313

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 3:16 PMOfficial source

bridge vulnerability (CVE-2026-27312)

HIGH
watchNVDCVE-2026-27312

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 3:16 PMOfficial source

bridge vulnerability (CVE-2026-27311)

HIGH
watchNVDCVE-2026-27311

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 3:16 PMOfficial source

bridge vulnerability (CVE-2026-27310)

HIGH
watchNVDCVE-2026-27310

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Apr 14, 2026, 3:16 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Adobe threat watch page?

It is the Adobe-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Adobe watch page?

Use it to confirm whether current Adobe issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Adobe security issues?

Yes. ITECS can help map Adobe advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.