Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CAI Content Credentials — Vulnerabilities & Security Advisories 14

All 14 CVE vulnerabilities found in CAI Content Credentials, with AI-generated Chinese analysis, references, and POCs.

This page documents vulnerability aggregation data for the CAI Content Credentials product, focusing on common weakness enumerations and associated risk tags. It collects a comprehensive range of security flaws affecting the content authentication and provenance standards managed by the Coalition for Content Provenance and Authenticity. The coverage spans historical records up to the present day, ensuring that both legacy issues and newly discovered threats are included in the dataset. Users can utilize this resource to track vendor advisories from key industry players involved in digital media integrity. It provides a structured view to help security professionals understand specific weakness classes within the context of credentialing systems. Additionally, users can look up the complete vulnerability history of the CAI Content Credentials implementation to assess long-term security trends. This aggregation serves as a central reference point for evaluating the robustness of content provenance technologies against known attack vectors. By consolidating disparate reports, the page facilitates a clearer understanding of how different components interact with potential security risks. It is designed for developers, auditors, and security analysts who need accurate, up-to-date information on the threat landscape surrounding digital content credentials. The data supports informed decision-making regarding compliance, risk management, and remediation strategies. All entries are categorized to allow for efficient filtering and comparison across different versions and configurations. This approach ensures that stakeholders can quickly identify relevant exposure points without sifting through unstructured data sources. The goal is to enhance transparency and accountability in the digital supply chain by making vulnerability information accessible and actionable.

Vendor: Adobe

CVE IDTitleCVSSSeverityPublished
CVE-2026-34672 CAI Content Credentials | Integer Underflow (Wrap or Wraparound) (CWE-191) CWE-191 6.2 Medium2026-05-12
CVE-2026-34671 CAI Content Credentials | Integer Overflow or Wraparound (CWE-190) CWE-190 6.2 Medium2026-05-12
CVE-2026-34669 CAI Content Credentials | Improper Input Validation (CWE-20) CWE-20 6.2 Medium2026-05-12
CVE-2026-34678 CAI Content Credentials | Uncontrolled Resource Consumption (CWE-400) CWE-400 6.2 Medium2026-05-12
CVE-2026-34688 CAI Content Credentials | Improper Input Validation (CWE-20) CWE-20 6.2 Medium2026-05-12
CVE-2026-34680 CAI Content Credentials | Integer Overflow or Wraparound (CWE-190) CWE-190 6.2 Medium2026-05-12
CVE-2026-34668 CAI Content Credentials | Improper Input Validation (CWE-20) CWE-20 6.2 Medium2026-05-12
CVE-2026-34673 CAI Content Credentials | Uncontrolled Resource Consumption (CWE-400) CWE-400 6.2 Medium2026-05-12
CVE-2026-34667 CAI Content Credentials | Integer Underflow (Wrap or Wraparound) (CWE-191) CWE-191 6.2 Medium2026-05-12
CVE-2026-34665 CAI Content Credentials | Uncontrolled Resource Consumption (CWE-400) CWE-400 7.5 High2026-05-12
CVE-2026-34670 CAI Content Credentials | Improper Input Validation (CWE-20) CWE-20 6.2 Medium2026-05-12
CVE-2026-34679 CAI Content Credentials | Improper Input Validation (CWE-20) CWE-20 6.2 Medium2026-05-12
CVE-2026-34666 CAI Content Credentials | Improper Input Validation (CWE-20) CWE-20 6.2 Medium2026-05-12
CVE-2026-34677 CAI Content Credentials | Uncontrolled Resource Consumption (CWE-400) CWE-400 6.2 Medium2026-05-12

All 14 known CVE vulnerabilities affecting CAI Content Credentials with full Chinese analysis, references, and POCs where available.