Several vulnerabilities in Adobe products could allow an arbitrary code execution


Several vulnerabilities have been discovered in Adobe products, the most serious of which could allow arbitrary code execution.

  • Adobe After Effects used to create animated graphics, visual effects and composits in cinema, television and online content.
  • 3D Adobe Substance viewer A 3D visualization and editing tool for the opening, adjustment and rendering of 3D models.
  • Adobe Audition Professional Audio Edition and mixture of software for recording, restoration and production of high quality sound.
  • Adobe Incopy A writing and publishing tool that fits into Adobe Indesign for collaborative publication workflows.
  • Adobe Indesign used to design and publish brochures, digital magazines, ebooks, posters and presentations.
  • Adobe connects a web conference platform to accommodate virtual meetings, webinars and online training sessions.
  • Adobe dimension A 3D design tool to create models of photorealistic products and brand visualizations.
  • Adobe 3D Substance Stage a 3D design and scene rendering tool to assemble and light up photorealist compositions.
  • Adobe Illustrator A Vector Graphics Editor for the creation of logos, icons, illustrations and typography.
  • Adobe Framemaker A document processor for the creation and publication of structured and structured technical documents.
  • Adobe Experience Manager (AEM) forms allow the creation and deployment of digital forms integrated into Backend systems.
  • Adobe Experience Manager (AEM) selects a digital signaling solution to manage interactive experiences through physical screens.
  • Adobe Coldfusion A rapid web application development platform that supports integration with databases, APIs and cloud services.

The successful exploitation of the most serious of these vulnerabilities could allow arbitrary execution of code in the context of the registered user. According to the privileges associated with the user, an attacker could then install programs; Show, modify or delete data; Or create new accounts with complete user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those that operate with the rights of administrative users

Leave a Reply

Your email address will not be published. Required fields are marked *