Tuesday, June 25, 2024

Critical Code Execution Flaws With Adobe InDesign, Framemaker, and Experience Manager – Update Now!

Adobe has released updates that fix critical vulnerabilities in the Adobe InDesign, Framemaker, and Experience Manager. Attackers can exploit the vulnerability to execute code in the context of the current user.

Adobe InDesign | APSB20-52

The update addresses multiple critical security vulnerabilities with Adobe InDesign that allows an attacker to execute arbitrary code in the context of the user.

Adobe InDesign 15.1.1 and below are affected with the vulnerability, users are recommended to update with the 15.1.2 version.

Adobe Experience Manager | APSB20-56

The updates for Adobe Experience Manager (AEM) and the AEM Forms add-on package resolves Critical and Important security vulnerabilities.

Successful exploitation of these vulnerabilities could result in arbitrary JavaScript execution in the browser.

Adobe Experience Manager 6.5.5.0 and earlier versions, 6.4.8.1 and earlier versions, 6.3.3.8 and earlier versions, 6.2 SP1-CFP20, and earlier versions are affected.

Adobe Framemaker | APSB20-54

Security updates for Adobe Framemaker cover multiple critical vulnerabilities, successful exploitation leads to arbitrary code execution in the context of the current user.

Adobe Framemaker 2019.0.6 and below are affected with the vulnerability, users are recommended to update with 2019.0.7.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Related Read

Adobe Released Security Updates for 87 Vulnerabilities with Media Encoder, Flash, Adobe Acrobat and Reader

Adobe Released Security Updates & Fixed 43 Vulnerabilities in Acrobat Reader, Adobe Flash & More

Adobe Releases Security Updates that Fixes Critical Vulnerabilities with Photoshop CC and Digital Editions

Website

Latest articles

Beware Of Shorten URLs With Word Files That Install Remcos RAT

A new method of distributing the Remcos Remote Access Trojan (RAT) has been identified.This...

Top 10 Best Penetration Testing Companies & Services in 2024

Penetration Testing Companies are pillars of information security; nothing is more important than ensuring...

Hackers Use Windows XSS Flaw To Execute Arbitrary Command In MMC Console

Attackers are leveraging a new infection technique called GrimResource that exploits MSC files.By...

New Webkit Vulnerabilities Let Attackers Exploit PS4 And PS5 Playstations

Webkit vulnerabilities in PS4 and PS5 refer to bugs found in the Webkit engine...

Hackers Exploit Multiple WordPress Plugins to Hack Websites & Create Rogue Admin Accounts

Wordfence Threat Intelligence team identified a significant security breach involving multiple WordPress plugins. The initial...

Hackers Attacking Windows IIS Server to Upload Web Shells

Windows IIS Servers often host critical web applications and services that provide a gateway...

WikiLeaks Founder Julian Assange Released in Stunning Deal with U.S.

WikiLeaks founder Julian Assange has been released from prison after reaching a deal with...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles