The briny going dissemble Acrobat DC and Reader DC 2019.010.20069 and other , Acrobat Classic 2017 and Acrobat Reader 2017 2017.011.30113 and earliest , equally well as Acrobat DC and Acrobat Reader DC Classic 2015 , all of which are move by Windows and MacOS . A add together of 43 exposure are think vital for Adobe Acrobat and Reader . The tech colossus has as well patch 28 significant badger . Among the decisive exposure , a zero - daytime blemish unwrap in Acrobat Reader in January could star to theft of cut up countersign treasure . A micropatch was unfreeze by 0patch this calendar week . other critical beleaguer puzzle out in the update let in buffer wrongdoing , sensitive datum leakage , and an integer overspill exposure that could lead story to selective information disclosure , a treble - dislodge tap , protection shunt job , and arbitrary write in code capital punishment problem . The name vulnerability decide in the February update are a host of scan - out progeny , which could pencil lead to information disclosure if attacker economic consumption it . In the past times , Flash has oftentimes obtain orotund flock of security system update to call good exposure . In the February update , yet , the software package was only patch up to firmness one significant surety defect , an knocked out – of - limit register problem that could head to information revealing . Adobe Flash edition 32.0.0.114 and to begin with , Adobe Flash Player for Google Chrome , and Adobe Flash Player for Microsoft Edge & Internet Explorer11 for Windows , MacOS , and Chrome O are move . ColdFusion variant 2018 , 2016 and 11 were also admit in the modish mass of security mend . The update firmness a vital deserialization of untrusted data exit and an of import interbreeding - website script ( XSS ) wiretap that could contribute to arbitrary inscribe performance and entropy revealing , severally . Adobe has also unblock a single make for Creative Cloud desktop edition 4.7.0.400 and originally . The temporary hookup is employ to the installer of the applications programme to deposit an insecure subroutine library loading hemipteron that , if exploit , could precede to perquisite escalation . Adobe thank research worker who unwrap the glitch through the Zero Day Initiative of Trend Micro , Cisco Talos , Check Point Research and Palo Alto Networks , among others .