Vulnerability Description
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adobe | Xmp Toolkit Software Development Kit | <= 2020.1 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://helpx.adobe.com/security/products/xmpcore/apsb21-65.htmlPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00032.htmlMailing ListThird Party Advisory
- https://helpx.adobe.com/security/products/xmpcore/apsb21-65.htmlPatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00032.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/08/msg00003.html
FAQ
What is CVE-2021-36050?
CVE-2021-36050 is a vulnerability with a CVSS score of 7.8 (HIGH). XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires ...
How severe is CVE-2021-36050?
CVE-2021-36050 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-36050?
Check the references section above for vendor advisories and patch information. Affected products include: Adobe Xmp Toolkit Software Development Kit, Debian Debian Linux.