Tuesday, November 12, 2024
HomeAdobeAdobe Security Update fixes Critical Vulnerabilities in Flash Player, Campaign and ColdFusion

Adobe Security Update fixes Critical Vulnerabilities in Flash Player, Campaign and ColdFusion

Published on

Malware protection

Abode released security updates that fixes code execution  vulnerability in Flash Player, Campaign and ColdFusion. The security updates for Windows, macOS, Linux, and Chrome OS.

Adobe Flash Player

The Security updates addressed a critical vulnerability in Adobe Flash Player that allows an attacker to execute arbitrary code on the vulnerable machine with the context of the current user.  The Flash Player update is for Windows, macOS, Linux and Chrome OS.

The vulnerability can be tracked as CVE-2019-7845.

- Advertisement - SIEM as a Service

Affected Versions

Adobe Flash Player Desktop Runtime 32.0.0.192 and earlier
Adobe Flash Player for Google Chrome 32.0.0.192 and earlier
Adobe Flash Player for Microsoft Edge 32.0.0.192  and earlier
and Internet Explorer 11

Fixed versions

Adobe Flash Player Desktop Runtime 32.0.0.207
Adobe Flash Player for Google Chrome 32.0.0.207
Adobe Flash Player for Microsoft Edge 32.0.0.207
and Internet Explorer 11
Adobe Flash Player Desktop Runtime 32.0.0.207

Adobe Campaign Classic

Adobe addresses seven vulnerabilities with Campaign Classic, successful exploitation of the vulnerability results in arbitrary code execution.

Affected Version

Adobe Campaign Classic 18.10.5-8984 (and earlier versions)

Fixed version

Adobe Campaign 19.1.1-9026

Adobe ColdFusion

With the security update, Adobe resolves three critical vulnerabilities that could lead to arbitrary code execution. Security updates for ColdFusion versions 2018, 2016, and 11.

Affected Versions

ColdFusion 2018 Update 3 and earlier versions
ColdFusion 2016 Update 10 and earlier versions
ColdFusion 11 Update 18 and earlier versions

Fixed versions

ColdFusion 2018 Update 4
ColdFusion 2016 Update 11
ColdFusion 11 Update 19

Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Master in Wireshark Network Analysis to keep your self-updated.

Adobe Released Security Updates for 87 Vulnerabilities with Media Encoder, Flash, Adobe Acrobat and Reader

Adobe Released Security Updates & Fixed 43 Vulnerabilities in Acrobat Reader, Adobe Flash & More

Adobe Releases Security Updates that Fixes Critical Vulnerabilities with Photoshop CC and Digital Editions

75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...