
- #SECURITY UPDATE ADOBE ACROBAT READER DC CODE#
- #SECURITY UPDATE ADOBE ACROBAT READER DC PC#
- #SECURITY UPDATE ADOBE ACROBAT READER DC WINDOWS#
Read and change all your data on the websites you visit.The Chrome extension is installed without notifying you or asking for permission.

#SECURITY UPDATE ADOBE ACROBAT READER DC WINDOWS#
Reader DC classic release track: 15.006.30279Īs reported by Catalin Cimpanu on BleepingComputer and confirmed by Martin Brinkmann at ghacks, installing the DC continuous release track patch, which is the one that most Acrobat Reader users will install, brings along an extension for Google Chrome only, on Windows only.Reader DC continuous release track: 15.023.20053.
#SECURITY UPDATE ADOBE ACROBAT READER DC PC#
As Lucian Constantin reported in PC World, this month, 29 security holes were plugged. Acrobat DC is split into two branches, the "continuous release track" - the one affected by the spyware this month - and the "classic release track," which freezes the feature set at 2015 levels.Īdobe Acrobat Reader routinely receives a dozen or more security patches every month. Those who haven't gone to the cloud are still running Reader XI, which will lose support in October 2017. Southeast Asia (Includes Indonesia, Malaysia, Philippines, Singapore, Thailand, and Vietnam) - English Selecting a region changes the language and/or content on.

Aleksandar Nikolic of Cisco Talos (CVE-2017-2971).Wei Lei and Liu Yang of Nanyang Technological University, Anonymous working with Trend Micro's Zero Day Initiative, and Nicolas Grégoire - Agarri working with iDefense Vulnerability Contributor Program (CVE-2017-2949).


#SECURITY UPDATE ADOBE ACROBAT READER DC CODE#
