Software maker Adobe on Tuesday released fixes for at least 35 security flaws in a wide range of products, including serious code-execution bugs in the widely deployed Acrobat and Reader applications.
As part of its scheduled Patch Tuesday rollout, the San Jose, Calif. company called immediate attention to a high-severity bulletin documenting at least nine security defects in Adobe Acrobat and Reader for Windows and macOS.
The company flagged multiple critical-severity issues and warned that successful exploitation could lead to arbitrary code execution and memory leaks.
Adobe is also pushing users to prioritize an available security update for Adobe InDesign, warning that multiple critical- and important-severity flaws could lead to memory leaks, arbitrary code execution and application denial-of-service.
The company’s Adobe Substance 3D Sampler also received a security makeover with patches for seven documented flaws that expose users to computer takeover attacks.
“ This update addresses critical vulnerabilities in Adobe Substance 3D Sampler. Successful exploitation could lead to arbitrary code execution,” the company said in a bulletin.
Adobe also patched serious bugs in the Adobe Substance 3D Painter, Adobe Substance 3D Designer and Adobe Substance 3D Modeler products. “Successful exploitation could lead to application denial-of-service and arbitrary code execution.”
The company said it was not aware of any reports of in-the-wild exploitation of these vulnerabilities.
Related: Critical Flaws in Adobe Commerce, Photoshop, InDesign, Illustrator
Related: Remote Code Execution Flaw in Microsoft Message Queuing
Related: Code Execution Flaws in Multiple Adobe Software Products
Related: Microsoft Flags Major Bugs in HyperV, Exchange Server