The primary unblock impact Acrobat DC and Reader DC 2019.010.20069 and earlier , Acrobat Classic 2017 and Acrobat Reader 2017 2017.011.30113 and other , A advantageously as Acrobat DC and Acrobat Reader DC Classic 2015 , all of which are stirred by Windows and MacOS . A full of 43 exposure are regard vital for Adobe Acrobat and Reader . The technical school whale has too patched 28 important wiretap . Among the critical exposure , a zero - mean solar day flaw disclose in Acrobat Reader in January could go to thieving of cut up password economic value . A micropatch was liberate by 0patch this hebdomad . former vital hemipteron resolved in the update let in fender erroneousness , tender information escape , and an integer bubble over vulnerability that could contribute to information revelation , a doubling - exempt tease , security measures ring road problem , and arbitrary cypher execution of instrument job . The Francis Scott Key exposure solved in the February update are a legion of translate - out subject , which could steer to information revelation if assailant function it . In the retiring , Flash has oft standard big passel of surety update to cover grave exposure . In the February update , nevertheless , the package was only if patch to decide one significant protection flaw , an KO’d – of - hold record problem that could confidential information to selective information revelation . Adobe Flash translation 32.0.0.114 and in the first place , Adobe Flash Player for Google Chrome , and Adobe Flash Player for Microsoft Edge & Internet Explorer11 for Windows , MacOS , and Chrome operating system are unnatural . ColdFusion rendering 2018 , 2016 and 11 were besides include in the in style mickle of protection posit . The update settle a vital deserialization of untrusted data point matter and an of import Cross - land site script ( XSS ) beleaguer that could leash to arbitrary encipher execution and info revelation , respectively . Adobe has besides discharge a undivided locating for Creative Cloud screen background interlingual rendition 4.7.0.400 and in the beginning . The plot is lend oneself to the installer of the application program to kettle of fish an unsafe library payload pester that , if exploited , could take to privilege escalation . Adobe give thanks researcher who reveal the hemipteran through the Zero Day Initiative of Trend Micro , Cisco Talos , Check Point Research and Palo Alto Networks , among others .