Adobe on Tuesday announced the release of security updates for its Flash Player, Framemaker and Experience Manager products.
In Flash Player, for which Adobe plans on providing security updates only until the end of the year, the company patched a critical use-after-free bug that can allow an attacker to execute arbitrary code in the context of the current user.
A patch for this vulnerability is included in Flash Player 32.0.0.387, including for Chrome, Edge and Internet Explorer.
In its Framemaker document processor, Adobe fixed three critical vulnerabilities, including two out-of-bounds write issues that allow arbitrary code execution, and a memory corruption bug that can also be exploited for code execution.
Honggang Ren of Fortinet’s FortiGuard Labs and researcher Francis Provencher have been credited for reporting these vulnerabilities to Adobe.
In its Experience Manager content management solution, Adobe patched six cross-site scripting (XSS) and server-side request forgery (SSRF) flaws that have been rated important. The XSS vulnerabilities can be exploited to execute arbitrary JavaScript code in the targeted user’s browser, while the SSRF bugs can be used to obtain sensitive information.
Adobe says it has seen no evidence that these vulnerabilities have been exploited for malicious purposes and based on the priority ratings assigned by the company they are unlikely to be exploited in the near future.
Related: Adobe Patches Flaws in ColdFusion, After Effects, Digital Editions
Related: Adobe Patches 22 Vulnerabilities in Bridge, Illustrator
Related: Adobe Patches 36 Vulnerabilities in Acrobat, DNG SDK
Related: Researcher Finds Memory Corruption Vulnerabilities in Several Adobe Products

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 Working on Patch for BIG-IP Flaw That Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
