News
According to an advisory from Adobe, the critical vulnerability exists in Adobe Reader and Acrobat 9.2 and earlier versions. It is being exploited in the wild.
Adobe acknowledged that all versions of Reader and Acrobat contain at least one critical vulnerability.
Adobe Systems released a monster patch repairing 29 security vulnerabilities in several versions of Reader and Acrobat, preventing some remote code execution attacks targeting Windows, Mac OS X ...
Adobe’s security response team is scrambling to investigate new public reports of a new zero-day vulnerability affecting uses of its widely deployed PDF Reader software. In a brief note posted ...
All users of Adobe Reader/Acrobat should therefore show extreme caution when deciding which PDF files to open regardless of whether they have disabled JavaScript support or not.
Adobe's Acrobat and Acrobat Reader packages are currently under attack from a JavaScript-based exploit, similar to one which afflicted the software back in June.
Adobe, although they have admitted to the flaw, has not given a time line for fixing the affected applications with include Acrobat (Reader as well) 9.1, 8.1.4, 7.1.1 and earlier.
Security researchers have identified a Trojan which attacks a flaw in Adobe Reader's JavaScript handling to insert a backdoor - and a patch isn't due until tomorrow.
Adobe has already released a patch for Windows, included in the Adobe Reader and Acrobat versions 7.0.2. However, a similar Mac OS X patch has not yet been released.
Adobe is urging users of its PDF Reader and Acrobat software to install an update that fixes a couple of critical security holes in the products. The patches come amid news that booby-trapped PDF ...
Adobe is investigating new reports that hackers are attacking a previously unknown bug in the latest version of the company's Reader and Acrobat software.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results