{"api_version":"1","generated_at":"2026-05-13T05:56:14+00:00","cve":"CVE-2021-36053","urls":{"html":"https://cve.report/CVE-2021-36053","api":"https://cve.report/api/cve/CVE-2021-36053.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-36053","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-36053"},"summary":{"title":"CVE-2021-36053","description":"XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","state":"PUBLIC","assigner":"psirt@adobe.com","published_at":"2021-09-01 15:15:00","updated_at":"2023-10-19 20:51:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html","name":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html","refsource":"MISC","tags":[],"title":"Adobe Security Bulletin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html","name":"[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3585-1] exempi security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-36053","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-36053","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"36053","vulnerable":"1","versionEndIncluding":"2020.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"xmp_toolkit_sdk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36053","vulnerable":"1","versionEndIncluding":"2020.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"xmp_toolkit_software_development_kit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36053","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-36053","qid":"182366","title":"Debian Security Update for exempi (CVE-2021-36053)"},{"cve":"CVE-2021-36053","qid":"198834","title":"Ubuntu Security Notification for Exempi Vulnerabilities (USN-5483-1)"},{"cve":"CVE-2021-36053","qid":"6000108","title":"Debian Security Update for exempi (DLA 3585-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@adobe.com","DATE_PUBLIC":"2021-08-16T23:00:00.000Z","ID":"CVE-2021-36053","STATE":"PUBLIC","TITLE":"XMP Toolkit SDK Out-of-bounds Read Vulnerability In FindAndReadXMPChunk Could Lead To Information Exposure"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"XMP Toolkit","version":{"version_data":[{"version_affected":"<=","version_value":"2020.1"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"}]}}]},"vendor_name":"Adobe"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}]},"impact":{"cvss":{"attackComplexity":"Low","attackVector":"Local","availabilityImpact":"None","baseScore":3.3,"baseSeverity":"Low","confidentialityImpact":"Low","integrityImpact":"None","privilegesRequired":"None","scope":"Unchanged","userInteraction":"Required","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Out-of-bounds Read (CWE-125)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html","name":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-09-01 15:15:00","lastModifiedDate":"2023-10-19 20:51:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":3.3,"baseSeverity":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"2020.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"36053","Ordinal":"211563","Title":"CVE-2021-36053","CVE":"CVE-2021-36053","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"36053","Ordinal":"1","NoteData":"XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"36053","Ordinal":"2","NoteData":"2021-09-01","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"36053","Ordinal":"3","NoteData":"2021-09-01","Type":"Other","Title":"Modified"}]}}}