CVE-2026-44009 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via a null proto exception and permits an ...
Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code ...
PDF Guru, a global leader in document management, today announced the public release of its AI Image Enhancer. This high-fidelity restoration suite, ...
Many workplaces and educational institutions have completely switched from paper documents to digital ones. Consequently, Mac users are increasingly dealing with PDFs and other e-document file formats ...
With Firefox’s latest version 150 update for Windows, macOS, and Linux, Mozilla has introduced few genuinely new features but some noteworthy improvements. The split view is easier to use, the ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. This voice experience is generated by AI. Learn more. This ...
Adobe patches a critical PDF flaw exploited for months, allowing attackers to bypass sandbox protections and deliver malware. Users urged to update now.
Adobe has patched a vulnerability in its flagship document-reading apps, Acrobat DC, Reader DC and Acrobat 2024, that hackers have been actively exploiting for at least four months. The vulnerability, ...
Adobe Acrobat and Reader users are under attack from hackers using a zero-day vulnerability. Update within 72 hours, Adobe has warned.
Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. The attacks have been discovered by security researcher Haifei ...
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. Given the name of the PDF document, ...
A cybersecurity researcher is warning of a zero-day vulnerability in Adobe Reader that allows attackers to steal local files and potentially take full control of a victim’s system – simply by getting ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results