![]() ![]() to view, create, manipulate, print, and manage files in Portable Document Format. Qualys has released the following checks for these new vulnerabilities:Īdobe Reader and Acrobat Multiple Vulnerabilities (APSB19-17)Īdobe Acrobat is a family of application software and Web services developed by Adobe Inc. ![]() ![]() To fix newly discovered flaws in their software. Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition. Visit Qualys Security Blog to prioritize remediation. Their networks for these and other new vulnerabilities by accessing Vulnerability checks in the Qualys Cloud Platform to protectĪnnounced today by Adobe. I've raised a case with SMART regarding this and will post updates accordingly, but I wanted to share it on here in case anyone else comes across this issue.Qualys Vulnerability R
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |