News

Adobe's Acrobat and Acrobat Reader packages are currently under attack from a JavaScript-based exploit, similar to one which afflicted the software back in June.
Adobe acknowledged that all versions of Reader and Acrobat contain at least one critical vulnerability.
According to an advisory from Adobe, the critical vulnerability exists in Adobe Reader and Acrobat 9.2 and earlier versions. It is being exploited in the wild.
In July 2022, Adobe released a security update for vulnerabilities in Adobe Acrobat and Reader. The update fixed a vulnerability that is identified as CVE-2022-34233 discovered by Zscaler’s ThreatLabz ...
Adobe Acrobat is a software suite used for creating, viewing, and editing PDF (Portable Document Format) documents. It is developed and maintained by Adobe Systems and is available for Windows and ...
If nothing else, JavaScript should be disabled by default in Adobe Reader.” Henceforth, Sophos has recommended all users to disable JavaScript in Adobe Acrobat and Reader by default.
Five critical cross-site scripting flaws were fixed by Adobe in Experience Manager as part of its regularly scheduled patches.
This comes following the most recent security update for Adobe Acrobat and Reader. IT security and data protection firm, Sophos, has urged software provider Adobe to begin disabling JavaScript in its ...
Adobe Systems has patched its free Reader and commercial Acrobat software to fix the latest in what one researcher called an "epidemic" of JavaScript vulnerabilities in the popular apps.
Adobe patched its free Reader and commercial Acrobat software this week to plug the latest in what one researcher called an u201cepidemicu201d of JavaScript vulnerabilities.