Adobe has released security updates and hotfixes to address vulnerabilities in Flash Player, Photoshop, Bridge, Connect, and Experience Manager.
Adobe Flash Player 20.0.0.306 patches a total of 22 memory corruption flaws that can be exploited for arbitrary code execution. The issues were reported to Adobe by researchers at Google, Microsoft, NSFOCUS, Venustech, Qihoo360, and an expert who wanted to remain anonymous.
Updates released by Adobe for Photoshop CC and Bridge CC resolve three memory corruption vulnerabilities that can be leveraged for code execution. The flaws, discovered by Francis Provencher of COSIG, have been assigned the identifiers CVE-2016-0951, CVE-2016-0952 and CVE-2016-0953.
For the Windows version of its Connect web conferencing software, Adobe released updates to address a content spoofing issue (CVE-2016-0950), and an insufficient input validation flaw affecting a URL parameter (CVE-2016-0949). The update also includes a feature designed to protect users against cross-site request forgery (CSRF) attacks.
Adobe has credited Eugene Dokukin, Francisco Correa and Lawrence Amer for reporting these issues.
Hotfixes released by the company for versions 6.1.0, 6.0.0 and 5.6.1 of the enterprise content management solution Adobe Experience Manager patch four vulnerabilities affecting the Windows, Unix, Linux and OS X versions of the product.
The list of security bugs includes a Java deserialization issue (CVE-2016-0958), a cross-site scripting (XSS) vulnerability that could lead to information disclosure (CVE-2016-0955), a URL filter bypass (CVE-2016-0957), and an information disclosure bug in Apache Sling Servlets Post 2.3.6 (CVE-2016-0956).
The Experience Manager security holes were reported to Adobe by Damian Pfammatter of Compass Security Schweiz AG and Ateeq ur Rehman Khan of Vulnerability Lab.
Adobe says it’s not aware of any in-the-wild attacks leveraging the vulnerabilities patched on Tuesday in Flash Player, Photoshop, Bridge, Experience Manager and Connect.
Microsoft released 13 security bulletins on Tuesday to address nearly 40 vulnerabilities in Windows, Office, Internet Explorer and Edge.

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
- Cisco to Acquire Splunk for $28 Billion
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
- Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis
- Intel Launches New Attestation Service as Part of Trust Authority Portfolio
- Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems
Latest News
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- Air Canada Says Employee Information Accessed in Cyberattack
- BIND Updates Patch Two High-Severity DoS Vulnerabilities
- Faster Patching Pace Validates CISA’s KEV Catalog Initiative
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
- New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware
