News
This is in direct reaction to the most recent security vulnerability detected on Adobe Acrobat and Reader involving the JavaScript code.
Adobe, although they have admitted to the flaw, has not given a time line for fixing the affected applications with include Acrobat (Reader as well) 9.1, 8.1.4, 7.1.1 and earlier.
Adobe tackles critical code execution vulnerabilities in Acrobat, Reader This month’s security update fixes a variety of critical and important bugs in the software.
Disabling JavaScript will prevent code execution, but not crashes of Adobe Acrobat/Reader. Trend Micro identifies different malware related to this vulnerability in older versions of Adobe Acrobat ...
Software development firm, Adobe Systems (ADBE), announced on Tuesday that it will contribute source code of its ActionScript product to the Mozilla foundation, seeking to bolster standardized web ...
A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit.
Affected are Adobe Acrobat Reader versions 2018.009.20050 and 2017.011.30070 and earlier. The vulnerability allows attackers to hide malicious JavaScript code in a PDF file.
Adobe will be adding some new generative AI features to the Acrobat Reader. The company will now allow users to create and edit images in PDFs by just using text prompts.
Websense researcher Hermes Li has posted a blow-by-blow walkthrough (with screenshots) of the Adobe Acrobat/Reader vulnerability that’s currently under attack. Excerpt from the blog post: ...
Some versions of Adobe’s Acrobat Reader PDF editor are vulnerable to a high-severity flaw that threat actors are using to execute malicious code on target endpoints remotely. The alarm was ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results