Monday, March 3, 2025
HomeVulnerabilityAdobe Released Security Updates & Fixes for 112 Vulnerabilities that Affected Adobe...

Adobe Released Security Updates & Fixes for 112 Vulnerabilities that Affected Adobe Products

Published on

SIEM as a Service

Follow Us on Google News

Adobe security updates released that cover the updates for Adobe Flash Player, Experience Manager, Connect, Adobe Acrobat, and Reader.

Adobe Flash Player

Adobe released updates for the critical Flash player that affects flash player 30.0.0.113 and it’s earlier versions. By exploiting the vulnerability an attacker can run arbitrary codes without the user’s context.

The Vulnerabilities can be tracked as CVE-2018-5008, CVE-2018-5007 and it was fixed with Adobe Flash Player version 30.0.0.134.

ProductVersionPlatformPriorityAvailability
Adobe Flash Player Desktop Runtime30.0.0.134Windows, macOS2Flash Player Download Center

 

Flash Player Distribution

Adobe Flash Player for Google Chrome30.0.0.134Windows, macOS, Linux, and Chrome OS2Google Chrome Releases
Adobe Flash Player for Microsoft Edge and Internet Explorer 1130.0.0.134Windows 10 and 8.12Microsoft Security Advisory
Adobe Flash Player Desktop Runtime30.0.0.134Linux3Flash Player Download Center

Adobe Experience Manager

Adobe Experience Manager suffers critical Server-Side Request Forgery (SSRF) vulnerabilities, it affects from version 6.0 to 6.4. Adobe categorizes the updates in priority and recommends user’s to install the newest version.

The Vulnerabilities can be tracked as CVE-2018-5004, CVE-2018-5006 and CVE-2018-12809.

Adobe security updates for Adobe Connect

Adobe Connect 9.7.5 and it’s earliest version suffered authentication bypass vulnerability that would result in sensitive information disclosure.

Both of the vulnerabilities fixed with the version 9.8.1, along with that this update also resolves the issues with the session tokens validation.

The Vulnerabilities can be tracked as CVE-2018-4994, CVE-2018-12804 and CVE-2018-12805.

ProductVersionPlatformPriorityAvailability
Adobe Connect9.8.1All2Release note

Adobe Acrobat and Reader

Adobe fixed 104 vulnerabilities with security updates for Adobe Acrobat and Reader for Windows and macOS. It covers critical and important vulnerabilities, successful exploitation of the vulnerability may lead to arbitrary code execution without user’s context.

ProductTrackUpdated VersionsPlatformPriority RatingAvailability
Acrobat DCContinuous2018.011.20055Windows and macOS2Windows
macOS
Acrobat Reader DCContinuous2018.011.20055Windows and macOS2Windows
macOS
      
Acrobat 2017Classic 20172017.011.30096Windows and macOS2Windows
macOS
Acrobat Reader DC 2017Classic 20172017.011.30096Windows and macOS2Windows
macOS
      
Acrobat DCClassic 20152015.006.30434Windows and macOS2Windows
macOS
Acrobat Reader DCClassic 20152015.006.30434Windows and macOS2Windows
macOS

Users are recommended to update their software installations to the latest versions, to update manually Help for Adobe security updates > Check for Updates.

Also Read: 

Cisco Released Security Updates and Fixed Critical Vulnerabilities that Affected Cisco Products

Microsoft Released Security Updates for July and Fixed 53 Security Vulnerabilities

Debian Released Security Updates for July and Fixed Multiple Package Vulnerabilities

Apple Released Security Updates for iOS, macOS, Safari, iTunes – iOS 11.4.1 Released

Google Released Security Updates for More than 40 Android Security vulnerabilities

WordPress Update 4.9.7 – Critical Security Update to Resolve Bugs and Security Issues

VMware Released Security Updates for Critical Remote Code Execution Vulnerability

Microsoft Released Critical Security Updates with Patch for 50 Critical Vulnerabilities

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks

Security researchers have uncovered five significant vulnerabilities in Paragon Partition Manager's BioNTdrv.sys driver, affecting...

Substack Custom Domain Vulnerability Exposes Thousands to Potential Hijacking

A newly disclosed vulnerability in Substack's custom domain setup could allow malicious actors to...

PoC Released for Windows Hyper-V SYSTEM Privilege Exploit

Security researchers have publicly disclosed a proof-of-concept (PoC) exploit for CVE-2025-21333, a critical elevation-of-privilege vulnerability...