Thursday, January 30, 2025
HomeComputer SecurityAdobe Released August Patch Covering 11 Vulnerabilities That Affects Multiple Popular Adobe...

Adobe Released August Patch Covering 11 Vulnerabilities That Affects Multiple Popular Adobe Products

Published on

SIEM as a Service

Follow Us on Google News

Adobe August security updates cover’s 11 security vulnerabilities including two critical vulnerabilities with the most popular Adobe Acrobat and Reader.

With the last July, Tuesday patch Adobe released Security Updates & Fixes for 112 Vulnerabilities that Affected Multiple Adobe Products.

Adobe August Security Updates

Adobe Acrobat and Reader

The security updates cover both the Adobe Acrobat and Reader for Windows and MacOS. Successful exploitation of the vulnerability leads to arbitrary code execution in the context of the current user. The Critical Vulnerability fixed with 2018.011.20058.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds writeArbitrary Code ExecutionCriticalCVE-2018-12808
Untrusted pointer dereferenceArbitrary Code ExecutionCriticalCVE-2018-12799

Adobe Experience Manager

Starting from version 6.0 Adobe Experience Manager suffers a cross-site scripting vulnerability that could result in information disclosure and input validation bypass. It was fixed with Adobe Experience Manager version 6.4.

Adobe Flash Player

Important vulnerabilities with Flash Player 30.0.0.134 and earlier versions for Windows, macOS, Linux and Chrome OS. Successful exploitation of the vulnerability leads to arbitrary code execution in the context of the current user. Users are recommended to update with latest version 30.0.0.154 of Adobe Flash Player.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds readInformation DisclosureImportantCVE-2018-12824
Security bypassSecurity Mitigation BypassImportantCVE-2018-12825
Out-of-bounds readInformation DisclosureImportantCVE-2018-12826
Out-of-bounds readInformation DisclosureImportantCVE-2018-12827
Use of a component with a known vulnerabilityPrivilege EscalationImportantCVE-2018-12828

Creative Cloud Desktop

Adobe creative cloud for windows suffered insecure library loading vulnerability which may lead to privilege escalation. The Vulnerability affects 4.5.0.324 and earlier versions. The Risk can be mitigated by updating to 4.5.5.342.

Vulnerability CategoryVulnerability ImpactSeverityCVE Numbers
Insecure Library Loading (DLL hijacking)Privilege EscalationImportantCVE-2018-5003

Users are recommended to update their software installations to the latest versions, to update manually Help for Adobe security updates > Check for Updates.

US Government agencies to are asked to remove the Adobe Flash contents from websites and computers before August 1, 2019, as Adobe already announced to stop supporting Adobe Flash Media Player in 2020 and it will no longer receive updates or technical support.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...