Security

Adobe fixes critical flaws in Flash Player and Framemaker

Adobe has released security updates to address vulnerabilities in its Flash Player, Framemaker and Experience Manager products.

Adobe has released security updates to address ten vulnerabilities in its Adobe Flash Player, Adobe Experience Manager, and Adobe Framemaker products.

Four vulnerabilities out of ten are rated as ‘Critical,’ they could allow a remote attacker to execute commands on vulnerable systems.

Adobe Flash Player

Adobe has released security updates to address a critical vulnerability in Adobe Flash Player for Windows, macOS, Linux and Chrome OS.

The issue, tracked as CVE-2020-9633, is a user after free vulnerability that could lead to arbitrary code execution in the context of the current user.

“These updates address a critical vulnerability in Adobe Flash Player. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the security advisory published by Adobe.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Use After Free Arbitrary Code ExecutionCriticalCVE-2020-9633

Adobe has released the flaw with the release of Adobe Flash Player 32.0.0.387.

Adobe Experience Manager

Adobe released security updates for Adobe Experience Manager that address six vulnerabilities rated as “Important severity” that could lead to information disclosure or arbitrary JavaScript execution in the browser.

Vulnerability Category
Vulnerability Impact
Severity
CVE Number
Affected Versions
Server-side request forgery (SSRF)Sensitive Information DisclosureImportantCVE-2020-9643AEM 6.1AEM 6.2AEM 6.3AEM 6.4
Cross-site scripting (DOM-based)Arbitrary JavaScript execution in the browserImportantCVE-2020-9647AEM 6.1AEM 6.2AEM 6.3AEM 6.4AEM 6.5
Cross-site scriptingArbitrary JavaScript execution in the browserImportantCVE-2020-9648AEM 6.1AEM 6.2AEM 6.3AEM 6.4AEM 6.5
Cross-site scripting (stored)Arbitrary JavaScript execution in the browserImportantCVE-2020-9644AEM 6.1AEM 6.2AEM 6.3AEM 6.4AEM 6.5
Blind server-side request forgery (SSRF)Sensitive Information DisclosureImportantCVE-2020-9645AEM 6.1AEM 6.2AEM 6.3AEM 6.4AEM 6.5
Cross-site scripting (reflected)Arbitrary JavaScript execution in the browserImportantCVE-2020-9651AEM 6.1AEM 6.2AEM 6.3AEM 6.4AEM 6.5

Adobe fixed the issues with the release of Experience Manager 6.4 and 6.5.

Adobe Framemaker

Adobe has released security updates for Adobe Framemaker that resolve three ‘Critical’ remote code execution vulnerabilities.

Vulnerability CategoryVulnerability ImpactSeverityCVE Numbers
Memory Corruption  Arbitrary code executionCriticalCVE-2020-9636
Out-of-Bounds Write  Arbitrary code executionCriticalCVE-2020-9634CVE-2020-9635

Adobe released version 2019.0.6 to fix the above vulnerabilities.

Adobe is not aware of attacks in the wild exploiting the above vulnerabilities.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – foreign hackers, cybersecurity)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

5 hours ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

12 hours ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

16 hours ago

U.S. CISA adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration…

19 hours ago

Odido confirms massive breach; 6.2 Million customers impacted

Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID…

1 day ago

ApolloMD data breach impacts 626,540 people

A May 2025 cyberattack on ApolloMD exposed the personal data of over 626,000 patients linked…

1 day ago

This website uses cookies.