Friday, July 23, 2021

Adobe security update squashes critical vulnerabilities in Lightroom, Prelude

Must Read

CERT report Shows security holes In the Polish education sector

Education associations in Poland are counseled to tighten their security controls following a fresh report highlighted many different openings...

UK NCA Announced the Arrest of 21 Clients of”WeLeakInfo”

Purchasing stolen data out of online marketplaces is quite risky, as you're getting involved in a cyber-criminal functioning by...

Absa Suffers Data breach

Absa has informed customers of a data breach possibly compromising their private info. As stated by the Johannesburg, South Africa-based...

Adobe’s final key patch around 2020 has coped with random code and JavaScript implementation bugs.

Adobe’s past scheduled security update of this year has solved critical vulnerabilities from Lightroom, Prelude, and Expertise Supervisor.

The initial fix was issued for Adobe Lightroom, a picture editing software that’s popular with professional photographers. Impacting Lightroom Classic version 10.0 and under on Windows and macOS machines, the important issue — monitored since CVE-2020-24447 — is called a rampant search path element exposure resulting in arbitrary code execution.

Another crucial bug was discovered in Adobe Prelude  for both Windows and macOS, variant 9.01 and sooner. Tracked as CVE-2020-24440, the acute vulnerability was brought on by an uncontrolled search route and when used by attackers, may result in”arbitrary code execution in the context of the present user,” according to Adobe.

Adobe’s third safety aide describes Adobe Experience Supervisor  (AEM) and the AEM Forms add-on bundle on all platforms.

Two vulnerabilities are patched in such software packages. The very first, CVE-2020-24445, is a crucial bug in AEM CS, and can also be located in AEM / as well as sooner.

CVE-2020-24445 is a saved cross-site scripting (XSS) flaw that may result in arbitrary JavaScript execution in the browser.

This vulnerability is a blind server-side request forgery problem which may be triggered with the aim of data disclosure.

Adobe’s November security upgrade handled another few vulnerabilities, two of which have been found from the Connect distant computing applications, and yet one in Reader. Connect’s bugs can be tapped to execute JavaScript implementation in a browser, whereas Reader’s only problem can be used to leak information.

In Microsoft’s final patch upgrade of the calendar year, published on Tuesday, the Redmond giant solved 58 vulnerabilities, 22 of which can be remote code execution (RCE) vulnerabilities.

Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.


Please enter your comment!
Please enter your name here

Latest News

OAIC: Uber found to have interfered with the privacy of over 1.2 million Australians

The Office of the Australian Information Commissioner (OAIC) has determined that Uber Technologies, Inc. and Uber B.V. have interfered...

Over 80 US Municipalities data are exposed due to Misconfigured Amazon S3

A team of Cybersecurity researchers at Wizcase found major data exposure of Over 80 US Municipalities due to the Misconfigured Amazon S3 Bucket. This happened...

Formbook malware Upgraded as an XLoader malware to Attack macOS Systems

Researchers have spotted an upgraded malware variant of Formbook malware which is now Upgraded as an XLoader malware to Attack macOS Systems. Cybersecurity researchers on...

Millions of HP, Samsung, Xerox Printers are Vulnerable to 16 year old bug

A 16-year-old security vulnerability affects Millions of HP, Samsung, Xerox Printers Driver allows attackers to gain admin rights on systems using the vulnerable driver...

MosaicLoader malware targets cracked software via SEO poisoning

New MosaicLoader malware targets users that are searching to download cracked software. Cybercriminals run ad campaigns in search engine results to boost their malicious...

More Articles Like This