Most of the vulnerabilities (21) affect the Framemaker document editor version for Windows. The most serious issues are characterized as critical. Vulnerabilities can lead to arbitrary code execution.
The vulnerabilities were reported to the company through the Trend Micro Zero Day Initiative by a researcher with the code name “Kdot”.
The computer company fixes critical memory corruption issues that attackers can exploit to execute arbitrary code on vulnerable systems and privilege escalation errors that can allow an attacker to write arbitrary files on the system. The rest defects in Acrobat and Reader products have been characterized as moderate gravity memory leaks and high gravity information leakage vulnerabilities.
The defects were reported to Adobe by independent experts and researchers from Qihoo 360, Tencent, Renmin University of China, Cisco Talos, the Chinese Academy of Sciences, Baidu and McAfee.
Another serious one error encountered by Adobe was an arbitrary code execution error in Flash Player, the successful exploitation of which could lead to arbitrary code execution.
Adobe has also encountered two vulnerabilities in digital versions, including a critical command injection bug and a major information leak.
Another major denial-of-service (DoS) issue affecting versions 6.5 and 6.4 of Adobe Experience Manager was also addressed by the company.
As Adobe has confirmed, it has not discovered any exploitation of these vulnerabilities in reality.