Adobe has released security updates to address ten vulnerabilities across its Acrobat and Reader, Connect, Commerce, and Campaign Standard products.
The IT giant addressed four vulnerabilities in Acrobat and Reader for Windows and macOS, two arbitrary code execution flaws, tracked as CVE-2021-40728 and CVE-2021-40731, and two privilege escalation issues, tracked as CVE-2021-40729 and CVE-2021-40720.
The two arbitrary code execution vulnerabilities have been rated as critical and received a CVSS score of 7.8, they are respectively a use-after-free and out-of-bounds issue vulnerability.
Adobe addressed two vulnerabilities in the Connect product tracked as CVE-2021-40719 and CVE-2021-40721.
The CVE-2021-40719 is a Deserialization of Untrusted Data issue that could lead to arbitrary code execution, it received a CVSS score of 9.8.
The company fixed an important-severity issue, in Acrobat Reader for Android, tracked as CVE-2021-40724, that could lead to arbitrary code execution.
Adobe addressed a critical deserialization vulnerability, tracked as CVE-2021-40720, in Adobe ops-cli, an open source Python wrapper used internally by the company.
The software company fixed an XSS flaw, tracked as CVE-2021-40744, in Adobe Campaign Standard for Windows and Linux.
The company is now aware of attacks in the wild exploiting the above vulnerabilities.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]