Adobe PDF Reader Zero-Day Exploit, Vulnerabilities

Adobe PDF Reader Zero-Day Exploit, Vulnerabilities

The latest versions of Adobe Reader and Acrobat (version 11.0.01), X (version 10.1.5) and earlier versions for Windows and Macintosh, have critical vulnerabilities that can be exploited by a hacker. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of your computer.

Advertisements - Continue reading below

Adobe said they are aware of these vulnerabilities being exploited where a malicious PDF is sent in an e-mail message designed to trick users into clicking on or opening it.

Adobe is in the process of working on a fix for these issues and when a fix or patch is ready, it will be posted at this website http://blogs.adobe.com/psirt/ .

Keep checking http://blogs.adobe.com/psirt/ for a fix or patch and be careful when opening PDFs. If you are currently receiving PDF documents in an e-mail message or links to one, do not open them or click on the links until Adobe is able to fix or patch this exploit or vulnerabilities.

Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search engine.Search
Write commentWrite your comment or view the ones below.    +
Was this article helpful?
Advertisements - Continue reading below
Comments, Answers, Reviews or Questions
To protect your privacy, please remove sensitive or identifiable information from your comments, questions, or reviews. Please keep conversations courteous and on-topic.

waiting
Write Your Comment, Answer, Review or Question

Advertisements - Continue reading below
Advertisements - Continue reading below
Advertisements - Continue reading below
Advertisements - Continue reading below
Advertisements - Continue reading below
Advertisements - Continue reading below
Advertisements - Continue reading below
Advertisements - Continue reading below
Adobe PDF Reader Zero-Day Exploit, Vulnerabilities