Adobe’s Patch Tuesday updates for May 2019 fix a critical vulnerability in Flash Player and more than 80 flaws in the company’s Acrobat products.
A total of 84 CVEs have been assigned to the security holes patched with the latest versions of Acrobat and Acrobat Reader products for Windows and macOS.
The list of vulnerabilities includes many critical heap overflow, buffer error, double free, use-after-free, type confusion, and out-of-bounds write issues that can lead to arbitrary code execution. There are also many out-of-bounds read bugs that can result in information disclosure.
Over two dozen researchers have been credited by Adobe for reporting the Acrobat and Reader vulnerabilities.
In the case of Flash Player, the latest version for Windows, macOS, Linux and Chrome OS fixes a critical use-after-free vulnerability that can be exploited to execute arbitrary code in the context of the targeted user.
The security hole, tracked as CVE-2019-7837, was reported to Adobe by an anonymous researcher via Trend Micro’s Zero Day Initiative (ZDI).
Finally, Adobe patched a critical file parsing vulnerability that can lead to remote code execution and an important information disclosure issue in Adobe Media Encoder.
Adobe said it had not seen any evidence that these vulnerabilities had been exploited in the wild when it published its advisories. Moreover, while many of the flaws have been rated “critical,” the priority ratings assigned by the company suggest that the risk of exploitation in the near future is low.
On March 1, Adobe released an out-of-band update for its ColdFusion web application development platform to address a critical vulnerability exploited in the wild.
Related: Adobe Patches 43 Flaws Across Eight Products
Related: Adobe Releases Second Patch for Data Leakage Flaw in Reader
Related: Adobe Patches Disclosed Data Leakage Flaw in Reader
Related: Adobe Patches Flaws in Sandbox, Photoshop, Digital Editions

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
