Adobe player 35 critical vulnerabilities in its security patch update

Adobe player 35 critical vulnerabilities in its security patch update

Adobe’s cloud-in pivot: What have we learned
A decade ago, Adobe bought Omniture in a deal that revolved around creativity, content, and data together. It sounds a little nutty, but it turned out to be one of the enterprise software that has to be The Best bet. : https://zd.net/2Lxtpzf

It has to be more than 40 security updates to address especially the critical vulnerabilities in the software in this month’s patch update.

The majority of the corrections, the impact of Adobe Framemaker, a document processor, according to a advisory published on Tuesday.

Adobe Framemaker versions of 2021.0.4, and one of the following Microsoft Windows operating systems are affected by a total of 21 vulnerabilities, all of which are considered to be critical — the highest severity level is currently being used.

Adobe launched Experience Platform, Azure, in Australia

Buffer-error, heap-overflow issues, out-of-bounds write to memory problems have been recognized, which may lead to arbitrary code execution.

Critical, important and moderate security is broken also to be dealt with in Adobe Acrobat, the DC Reader to DC, Acrobat / Reader, 2017, and Acrobat / Reader of 2021 on Windows and mac os.

In total, 12 critical vulnerabilities — heap overflow buffer for errors, use-after-free flaws, and privilege escalation bugs, they’re getting crushed. These types of protection, and if they are taken advantage of, possibly leading to the execution of arbitrary code and arbitrary file system writes.

It has also solved three major out-of-walls, please read the problems that led to the disclosure of the information, and two of the heavy pile of exhaustion vulnerabilities that could be exploited to cause memory leaks.

There are two vulnerabilities, to be noticed and that have been ironed out for this month Adobe Digital Editionsversion 4.5.11, Windows-based machines.

CNET: The protection of your privacy, or pay the price to the consumer techlash, a report warns

The first, CVE-2020-3759, is an important buffer vulnerability that can be exploited in order to determine the cause of the leakage of personal information. Thesecond and more serious of the two, CVE-2020-3760 is a critical command-injection issue, and can be armed to the execution of arbitrary code.

Adobe’s Flash Player has also been published in the February update. Versions of 32.0.0.321 and earlier on Windows, mac, Linux, and Chrome OS, are affected by the CVE-2020-3757), a critical kind of confusion, a bug that, if exploited, could lead to the execution of arbitrary code.

The tech giant has released a hotfix for the security Adobe Experience Managerversions 6.4 and 6.5 on all platforms. The auto-update addresses CVE-2020-3741, in a resource-draining bug, which can lead to a denial-of-service.

It has, thanks to researchers at Trend Micro Zero Day, Qihoo 360 Technology, Topsec Alpha Team, and Cisco’s Talos, McAfee, and others to report potential security weaknesses.

Microsoft’s February Patch Tuesday it was also huge, with a correction for the 99 vulnerabilities, including a zero-day vulnerability affecting Internet Explorer. A total of 11 bugs that were deemed to be critical.

TechRepublic: PayPal is at the top of the list of the most-imitated brands in phishing attacks

On Tuesday, Adobe launched a new version of the Adobe’s XD with support for windows, Voice Control, a boost to the software for ease of access. The feature will allow users to be able to open it and the Adobe XD for the use of their voice instead of a trackpad or a mouse.

Previous related coverage


Any advice? Get in touch securely via WhatsApp | Signal +447713 025 499, or Keybase: charlie0


Compsmag
Logo