Adobe has patched five vulnerabilities in its ColdFusion, After Effects and Digital Editions products, but none of the flaws appears too serious.
In ColdFusion 2016 and 2018, Adobe addressed three important-severity vulnerabilities related to insufficient input validation, DLL hijacking, and improper access control. The security holes can be exploited for DoS attacks, privilege escalation, and for obtaining information on the file system structure.
In Adobe After Effects for Windows and macOS, the company patched an important-severity out-of-bounds read vulnerability that can lead to information disclosure.
Finally, in its Digital Editions product, Adobe fixed an important information disclosure issue related to file enumeration.
Jason Troy, Raki Ben Hamouda, and researchers from imec-DistriNet at KU Leuven, Trend Micro’s Zero Day Initiative, and Secure D have been credited for reporting these security flaws.
Adobe says it has found no evidence to suggest that these vulnerabilities have been exploited in attacks, and based on the priority ratings assigned by the company they are unlikely to be exploited for malicious purposes anytime soon.
Microsoft’s Patch Tuesday updates for April 2020 address 113 vulnerabilities, including several Windows flaws that have been exploited in attacks.
Related: Critical Flaw in Adobe Creative Cloud App Allows Hackers to Delete Files
Related: Oracle VirtualBox, Adobe Reader, Windows Hacked at Pwn2Own 2020
Related: Adobe Patches 42 Vulnerabilities Across Five Products
Related: Adobe Patches Vulnerabilities in Illustrator, Experience Manager

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
