{"api_version":"1","generated_at":"2026-04-22T16:04:40+00:00","cve":"CVE-2021-40716","urls":{"html":"https://cve.report/CVE-2021-40716","api":"https://cve.report/api/cve/CVE-2021-40716.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-40716","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-40716"},"summary":{"title":"CVE-2021-40716","description":"XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","state":"PUBLIC","assigner":"psirt@adobe.com","published_at":"2021-09-29 16:15:00","updated_at":"2023-11-07 03:38:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html","name":"[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3585-1] exempi security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html","name":"https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html","refsource":"MISC","tags":[],"title":"Adobe Security Bulletin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-40716","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-40716","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"40716","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"xmp_toolkit_software_development_kit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"40716","vulnerable":"1","versionEndIncluding":"2021.07","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"xmp_toolkit_software_development_kit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"40716","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-40716","qid":"184372","title":"Debian Security Update for exempi (CVE-2021-40716)"},{"cve":"CVE-2021-40716","qid":"198834","title":"Ubuntu Security Notification for Exempi Vulnerabilities (USN-5483-1)"},{"cve":"CVE-2021-40716","qid":"6000108","title":"Debian Security Update for exempi (DLA 3585-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@adobe.com","DATE_PUBLIC":"2021-09-14T23:00:00.000Z","ID":"CVE-2021-40716","STATE":"PUBLIC","TITLE":"XMP Toolkit SDK SVG_Adapter Out-of-bounds Read Information Disclosure"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"XMP Toolkit","version":{"version_data":[{"version_affected":"<=","version_value":"2021.07"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"}]}}]},"vendor_name":"Adobe"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}]},"impact":{"cvss":{"attackComplexity":"Low","attackVector":"Local","availabilityImpact":"None","baseScore":5.5,"baseSeverity":"Medium","confidentialityImpact":"High","integrityImpact":"None","privilegesRequired":"None","scope":"Unchanged","userInteraction":"Required","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Out-of-bounds Read (CWE-125)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html","name":"https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-09-29 16:15:00","lastModifiedDate":"2023-11-07 03:38:00","problem_types":["CWE-125"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"2021.07","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"40716","Ordinal":"216469","Title":"CVE-2021-40716","CVE":"CVE-2021-40716","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"40716","Ordinal":"1","NoteData":"XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"40716","Ordinal":"2","NoteData":"2021-09-29","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"40716","Ordinal":"3","NoteData":"2021-09-29","Type":"Other","Title":"Modified"}]}}}