Adobe has released security updates and hotfixes to address vulnerabilities in Flash Player, Photoshop, Bridge, Connect, and Experience Manager.
Adobe Flash Player 20.0.0.306 patches a total of 22 memory corruption flaws that can be exploited for arbitrary code execution. The issues were reported to Adobe by researchers at Google, Microsoft, NSFOCUS, Venustech, Qihoo360, and an expert who wanted to remain anonymous.
Updates released by Adobe for Photoshop CC and Bridge CC resolve three memory corruption vulnerabilities that can be leveraged for code execution. The flaws, discovered by Francis Provencher of COSIG, have been assigned the identifiers CVE-2016-0951, CVE-2016-0952 and CVE-2016-0953.
For the Windows version of its Connect web conferencing software, Adobe released updates to address a content spoofing issue (CVE-2016-0950), and an insufficient input validation flaw affecting a URL parameter (CVE-2016-0949). The update also includes a feature designed to protect users against cross-site request forgery (CSRF) attacks.
Adobe has credited Eugene Dokukin, Francisco Correa and Lawrence Amer for reporting these issues.
Hotfixes released by the company for versions 6.1.0, 6.0.0 and 5.6.1 of the enterprise content management solution Adobe Experience Manager patch four vulnerabilities affecting the Windows, Unix, Linux and OS X versions of the product.
The list of security bugs includes a Java deserialization issue (CVE-2016-0958), a cross-site scripting (XSS) vulnerability that could lead to information disclosure (CVE-2016-0955), a URL filter bypass (CVE-2016-0957), and an information disclosure bug in Apache Sling Servlets Post 2.3.6 (CVE-2016-0956).
The Experience Manager security holes were reported to Adobe by Damian Pfammatter of Compass Security Schweiz AG and Ateeq ur Rehman Khan of Vulnerability Lab.
Adobe says it’s not aware of any in-the-wild attacks leveraging the vulnerabilities patched on Tuesday in Flash Player, Photoshop, Bridge, Experience Manager and Connect.
Microsoft released 13 security bulletins on Tuesday to address nearly 40 vulnerabilities in Windows, Office, Internet Explorer and Edge.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
