
Cloud Vulnerability DB
A community-led vulnerabilities database
XMP Toolkit version 2020.1 and earlier contains a memory corruption vulnerability identified as CVE-2021-36046. The vulnerability was discovered and assigned on June 30, 2021, affecting Adobe's XMP Core and related implementations like Exempi. This security flaw requires user interaction to exploit and could potentially lead to arbitrary code execution in the context of the current user (NVD, Adobe Security).
The vulnerability has been assigned a CVSS v3.1 score with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating a high severity rating. The vulnerability specifically relates to memory corruption issues in the XMP Toolkit's core functionality (Adobe Security).
If successfully exploited, this vulnerability could lead to arbitrary code execution in the context of the current user. The impact could include unauthorized access to system resources, potential data manipulation, and system compromise. The vulnerability requires user interaction to be exploited, which somewhat mitigates the risk (NVD).
Various software vendors have released patches to address this vulnerability. Debian has released security updates for affected versions, with fixed versions available in bookworm (2.6.3-1) and sid/trixie (2.6.5-1). Ubuntu has also released security updates across multiple versions of their distribution. Users are advised to update their systems to the latest available versions (Debian Security, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."