Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Adobe Patches Critical Code Execution Bugs

Posted on July 8, 2025July 8, 2025 By CWS

Adobe on Tuesday introduced the rollout of safety fixes for 58 vulnerabilities throughout 13 merchandise, together with three critical-severity flaws in Adobe Join, ColdFusion, and Expertise Supervisor Kinds (AEM Kinds) on JEE.

Probably the most extreme of those bugs is CVE-2025-49533 (CVSS rating of 9.8), a deserialization of untrusted knowledge in AEM Kinds on JEE that might result in arbitrary code execution.

Though it says it’s not conscious of any exploits within the wild focusing on the safety defect, Adobe marked the patch as precedence 1, urging customers to replace to AEM Kinds on JEE model 6.5.0.0.20250527.0.

Additionally marked precedence 1, the ColdFusion fixes resolve a complete of 13 safety defects, together with CVE-2025-49535 (CVSS rating of 9.3), an improper restriction of XML exterior entity reference (XXE) bug that might permit attackers to execute arbitrary code on weak methods.

Adobe’s advisory marks 4 different flaws as important, even when they’re categorized as high-severity, based mostly on their CVSS rating. Profitable exploitation of those points might result in privilege escalation, safety function bypass, and arbitrary file system learn, Adobe says.

Tracked as CVE-2025-27203 (CVSS rating of 9.3), the critical-severity vulnerability resolved in Adobe Join is described as a deserialization of untrusted knowledge difficulty that might result in arbitrary code execution.

On Tuesday, Adobe additionally warned of important code execution defects in Dimension, FrameMaker, Illustrator, InDesign, InCopy, and Substance 3D Viewer. All these points have a CVSS rating of seven.8.

Patches have been additionally launched for medium-severity flaws in After Results, Audition, Dimension, Expertise Supervisor Screens, FrameMaker, Illustrator, Substance 3D Stager, and Substance 3D Viewer.Commercial. Scroll to proceed studying.

Adobe says it’s not conscious of public exploits for any of those vulnerabilities, however customers are suggested to replace their purposes as quickly as attainable, as hackers are identified to have focused Adobe vulnerabilities in assaults.

Associated: Code Execution Flaws Hang-out Adobe Acrobat Reader, Adobe Commerce

Associated: Adobe Patches Huge Batch of Essential-Severity Software program Flaws

Associated:Adobe Calls Pressing Consideration to Essential ColdFusion Flaws

Security Week News Tags:Adobe, Bugs, Code, Critical, Execution, Patches

Post navigation

Previous Post: Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday
Next Post: How to Implement Role-Based Access Control (RBAC)

Related Posts

CISA Warns of Attacks Exploiting N-able Vulnerabilities Security Week News
Surge in Cyberattacks Targeting Journalists: Cloudflare Security Week News
GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets Security Week News
Check Point to Acquire AI Security Firm Lakera Security Week News
US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers Security Week News
Production at Steelmaker Nucor Disrupted by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News