Adobe on Tuesday introduced the discharge of patches for 52 vulnerabilities throughout 10 merchandise, together with critical-severity bugs that might result in code execution and privilege escalation.
Greater than half of the weaknesses Adobe addressed this month might be exploited for arbitrary code execution. Software denial-of-service (DoS) was the second commonest kind of resolved subject.
With regards to the severity of the resolved vulnerabilities, the Adobe Join replace takes the lead. It addresses two critical-severity flaws that might be exploited for arbitrary code execution (CVE-2026-34659, CVSS rating of 9.6) and privilege escalation (CVE-2026-34660, CVSS rating of 9.3).
This month’s replace for Adobe Commerce resolves the most important variety of security defects throughout the board. Content material Authenticity SDK is available in second, with patches for 14 flaws.
Adobe resolved ten high-severity and 5 medium-severity bugs with the Commerce replace. The problems might be exploited to bypass security options, trigger DoS circumstances, and execute arbitrary code.
All of the security defects resolved in Content material Authenticity SDK, one excessive and 13 medium-severity, may result in utility DoS.
Excessive-severity code execution points have been additionally resolved in After Results (4 vulnerabilities), Premiere Professional (3 flaws), Media Encoder (2), Substance 3D Painter (2), and Substance 3D Sampler (1).
The replace for Illustrator resolves two high-severity code execution defects and two medium-severity points resulting in DoS and reminiscence publicity. Of the 5 medium-severity weaknesses patched in Substance 3D Designer, 4 may result in code execution and one to arbitrary file system learn.
Adobe assigned a precedence ranking of two to the Commerce replace as a result of the product has beforehand been focused in assaults. The remaining updates have a precedence ranking of three.
The corporate says it’s not conscious of any of those vulnerabilities being exploited within the wild. Extra info will be discovered on Adobe’s PSIRT web page.



