Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for Arbitrary Code Execution.
Acrobat and Reader is a family of application software and Web services mainly used to create, view, and edit PDF documents.
Illustrator is a vector graphics editor and design program.
Bridge is a digital asset management application.
Adobe InCopy is a professional word processor.
InDesign is an industry-leading layout and page design software for print and digital media.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
webkitgtk-2.46.0-1.fc40
FEDORA-2024-00448ce92b Packages in this update: webkitgtk-2.46.0-1.fc40 Update description: Use Skia instead of cairo for 2D rendering and enable GPU rendering...
webkitgtk-2.46.0-2.fc41
FEDORA-2024-711db299ed Packages in this update: webkitgtk-2.46.0-2.fc41 Update description: Use Skia instead of cairo for 2D rendering and enable GPU rendering...
USN-7019-1: Linux kernel vulnerabilities
Ziming Zhang discovered that the DRM driver for VMware Virtual GPU did not properly handle certain error conditions, leading to...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful...
USN-7018-1: OpenSSL vulnerabilities
Robert Merget, Marcus Brinkmann, Nimrod Aviram, and Juraj Somorovsky discovered that certain Diffie-Hellman ciphersuites in the TLS specification and implemented...
USN-7017-1: Quagga vulnerability
Iggy Frankovic discovered that Quagga incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause...