News
Adobe's Acrobat and Acrobat Reader packages are currently under attack from a JavaScript-based exploit, similar to one which afflicted the software back in June.
Adobe, although they have admitted to the flaw, has not given a time line for fixing the affected applications with include Acrobat (Reader as well) 9.1, 8.1.4, 7.1.1 and earlier. Read more here ...
According to an advisory from Adobe, the critical vulnerability exists in Adobe Reader and Acrobat 9.2 and earlier versions. It is being exploited in the wild.
How to Use the Adobe JavaScript Blacklist Framework. Author: Dennis Fisher. January 11, 2010 4:44 pm. minute read Share this article: ...
In February, Adobe acknowledged the bug on Feb. 19, but waited until Feb. 24 to recommend disabling JavaScript. If Adobe’s patching pace for the newest bugs matches that of the February incident ...
Sophos - an IT security and data protection firm, has reportedly counseled software provider Adobe to start disabling JavaScript in its products by default. This is in direct reaction to the most ...
A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results