{"id":8093,"date":"2019-02-19T04:45:17","date_gmt":"2019-02-19T04:45:17","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8093"},"modified":"2019-02-19T04:45:17","modified_gmt":"2019-02-19T04:45:17","slug":"adobe-security-advisory-for-february-2019-security-updates","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/adobe-security-advisory-for-february-2019-security-updates\/","title":{"rendered":"Adobe Security Advisory for February 2019 Security Updates"},"content":{"rendered":"<h2><strong>Overview<\/strong><\/h2>\n<p>On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple vulnerabilities in such products as Adobe Flash Player, Adobe Creative Cloud Desktop Application, ColdFusion, and Adobe Acrobat and Reader.<!--more--><\/p>\n<p>For details about the security bulletins and advisories, visit the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security.html\">https:\/\/helpx.adobe.com\/security.html<\/a><\/p>\n<h2><strong>Vulnerabilities<\/strong><\/h2>\n<h3><strong>Adobe Flash Player<\/strong><\/h3>\n<p>Adobe has released a security update for Adobe Flash Player on Windows, macOS, Linux, and Chrome OS platforms. \u00a0Successful exploitation of these vulnerabilities could lead to the disclosure of information of the current user.<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<p>&nbsp;<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"27%\"><strong>\u00a0<\/strong><strong>Vulnerability Impact<\/strong><\/td>\n<td width=\"25%\"><strong>Vulnerability Type<\/strong><\/td>\n<td width=\"22%\"><strong>Severity Level<\/strong><\/td>\n<td width=\"24%\"><strong>CVE ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"27%\"><strong>Information disclosure<\/strong><\/td>\n<td width=\"25%\">Out-of-bounds read<\/td>\n<td width=\"22%\">Important<\/td>\n<td width=\"24%\">CVE-2019-7090<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>Affected versions: V32.0.0.114 and earlier<\/li>\n<li>Unaffected versions<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"194\">Product<\/td>\n<td width=\"197\">Version<\/td>\n<td width=\"162\">Platform<\/td>\n<\/tr>\n<tr>\n<td width=\"194\">Adobe Flash Player Desktop Runtime<\/td>\n<td width=\"197\">32.0.0.142<\/td>\n<td width=\"162\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"194\">Adobe Flash Player for Google Chrome<\/td>\n<td width=\"197\">32.0.0.142<\/td>\n<td width=\"162\">Windows, macOS, Linux, and Chrome OS<\/td>\n<\/tr>\n<tr>\n<td width=\"194\">Adobe Flash Player for Microsoft Edge and Internet Explorer 11<\/td>\n<td width=\"197\">32.0.0.144<\/td>\n<td width=\"162\">Windows 10 and 8.1<\/td>\n<\/tr>\n<tr>\n<td width=\"194\">Adobe Flash Player Desktop Runtime<\/td>\n<td width=\"197\">32.0.0.142<\/td>\n<td width=\"162\">Linux<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Reference link:<\/p>\n<p>https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb19-06.html<\/p>\n<h3><strong>Adobe Creative Cloud Desktop Application<\/strong><\/h3>\n<p>Adobe has released a security update available for the Creative Cloud Desktop Application on Windows. \u00a0This update addresses an insecure library loading vulnerability in this installer which could lead to privilege escalation.<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"30%\"><strong>Vulnerability Impact<\/strong><\/td>\n<td width=\"27%\"><strong>Vulnerability Type<\/strong><\/td>\n<td width=\"20%\"><strong>Severity Level<\/strong><\/td>\n<td width=\"20%\"><strong>CVE ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"30%\">Privilege escalation<\/td>\n<td width=\"27%\">\u00a0Insecure library loading (DLL hijacking)<\/td>\n<td width=\"20%\">Important<\/td>\n<td width=\"20%\">CVE-2019-7093<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>Affected versions: V4.7.0.400 and earlier<\/li>\n<li>Unaffected version: V4.8.0.410<\/li>\n<\/ul>\n<p>Reference link:<\/p>\n<p><strong>https:\/\/helpx.adobe.com\/security\/products\/creative-cloud\/apsb19-11.html<\/strong><\/p>\n<h3><strong>ColdFusion<\/strong><\/h3>\n<p>Adobe has released security updates for ColdFusion 2018, 2016, and 11 to patch a vulnerability that could lead to arbitrary code execution.<\/p>\n<p>&nbsp;<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"30%\"><strong>Vulnerability Impact<\/strong><\/td>\n<td width=\"27%\"><strong>Vulnerability Type<\/strong><\/td>\n<td width=\"20%\"><strong>Severity Level<\/strong><\/td>\n<td width=\"20%\"><strong>CVE ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"30%\">Arbitrary code execution<\/td>\n<td width=\"27%\">Untrusted data deserialization<\/td>\n<td width=\"20%\">Critical<\/td>\n<td width=\"20%\">CVE-2019-7091<\/td>\n<\/tr>\n<tr>\n<td width=\"30%\">Information disclosure<\/td>\n<td width=\"27%\">Cross-site scripting<\/td>\n<td width=\"20%\">Important<\/td>\n<td width=\"20%\">CVE-2019-7092<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"184\">Product<\/td>\n<td width=\"184\">Version<\/td>\n<td width=\"184\">Platform<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">ColdFusion 2018<\/td>\n<td width=\"184\">&lt;= Update 1<\/td>\n<td width=\"184\">All<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">ColdFusion 2016<\/td>\n<td width=\"184\">&lt;= Update 7<\/td>\n<td width=\"184\">All<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">ColdFusion 11<\/td>\n<td width=\"184\">&lt;= Update 15<\/td>\n<td width=\"184\">All<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"184\">Product<\/td>\n<td width=\"184\">Version<\/td>\n<td width=\"184\">Platform<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">ColdFusion 2018<\/td>\n<td width=\"184\">Update 2<\/td>\n<td width=\"184\">All<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">ColdFusion 2016<\/td>\n<td width=\"184\">Update 8<\/td>\n<td width=\"184\">All<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">ColdFusion 11<\/td>\n<td width=\"184\">Update 16<\/td>\n<td width=\"184\">All<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Reference link:<\/p>\n<p><strong>https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb19-10.html<\/strong><\/p>\n<h3><strong>Adobe Acrobat and Reader<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe Acrobat and Reader on Windows and macOS.<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\"><strong>Vulnerability Impact<\/strong><\/td>\n<td width=\"25%\"><strong>Vulnerability Type<\/strong><\/td>\n<td width=\"18%\"><strong>Severity Level<\/strong><\/td>\n<td width=\"30%\"><strong>CVE ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Buffer overflow<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7020<\/p>\n<p>CVE-2019-7085<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Information disclosure<\/td>\n<td width=\"25%\">Sensitive data disclosure<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7089<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Double free<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7080<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Information disclosure<\/td>\n<td width=\"25%\">Integer overflow<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7030<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Information disclosure<\/td>\n<td width=\"25%\">&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Out-of-bounds read<\/td>\n<td width=\"18%\">Important<\/td>\n<td width=\"30%\">CVE-2019-7021<\/p>\n<p>CVE-2019-7022<\/p>\n<p>CVE-2019-7023<\/p>\n<p>CVE-2019-7024<\/p>\n<p>CVE-2019-7028<\/p>\n<p>CVE-2019-7032<\/p>\n<p>CVE-2019-7033<\/p>\n<p>CVE-2019-7034<\/p>\n<p>CVE-2019-7035<\/p>\n<p>CVE-2019-7036<\/p>\n<p>CVE-2019-7038<\/p>\n<p>CVE-2019-7045<\/p>\n<p>CVE-2019-7047<\/p>\n<p>CVE-2019-7049<\/p>\n<p>CVE-2019-7053<\/p>\n<p>CVE-2019-7055<\/p>\n<p>CVE-2019-7056<\/p>\n<p>CVE-2019-7057<\/p>\n<p>CVE-2019-7058<\/p>\n<p>CVE-2019-7059<\/p>\n<p>CVE-2019-7063<\/p>\n<p>CVE-2019-7064<\/p>\n<p>CVE-2019-7065<\/p>\n<p>CVE-2019-7067<\/p>\n<p>CVE-2019-7071<\/p>\n<p>CVE-2019-7073<\/p>\n<p>CVE-2019-7074<\/p>\n<p>CVE-2019-7081<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Privilege escalation<\/td>\n<td width=\"25%\">Security bypass<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2018-19725<\/p>\n<p>CVE-2019-7041<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Out-of-bounds write<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7019<\/p>\n<p>CVE-2019-7027<\/p>\n<p>CVE-2019-7037<\/p>\n<p>CVE-2019-7039<\/p>\n<p>CVE-2019-7052<\/p>\n<p>CVE-2019-7060<\/p>\n<p>CVE-2019-7079<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">&nbsp;<\/p>\n<p>Type confusion<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7069<\/p>\n<p>CVE-2019-7086<\/p>\n<p>CVE-2019-7087<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Untrusted pointer dereference<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7042<\/p>\n<p>CVE-2019-7046<\/p>\n<p>CVE-2019-7051<\/p>\n<p>CVE-2019-7054<\/p>\n<p>CVE-2019-7066<\/p>\n<p>CVE-2019-7076<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Use after free<\/td>\n<td width=\"18%\">Critical<\/td>\n<td width=\"30%\">CVE-2019-7018<\/p>\n<p>CVE-2019-7025<\/p>\n<p>CVE-2019-7026<\/p>\n<p>CVE-2019-7029<\/p>\n<p>CVE-2019-7031<\/p>\n<p>CVE-2019-7040<\/p>\n<p>CVE-2019-7043<\/p>\n<p>CVE-2019-7044<\/p>\n<p>CVE-2019-7048<\/p>\n<p>CVE-2019-7050<\/p>\n<p>CVE-2019-7062<\/p>\n<p>CVE-2019-7068<\/p>\n<p>CVE-2019-7070<\/p>\n<p>CVE-2019-7072<\/p>\n<p>CVE-2019-7075<\/p>\n<p>CVE-2019-7077<\/p>\n<p>CVE-2019-7078<\/p>\n<p>CVE-2019-7082<\/p>\n<p>CVE-2019-7083<\/p>\n<p>CVE-2019-7084<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"184\">Product<\/td>\n<td width=\"184\">Version<\/td>\n<td width=\"184\">Platform<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat DC<\/td>\n<td width=\"184\">&lt;= 2019.010.20069<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat Reader DC<\/td>\n<td width=\"184\">&lt;= 2019.010.20069<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat 2017<\/td>\n<td width=\"184\">&lt;= 2017.011.30113<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat Reader 2017<\/td>\n<td width=\"184\">&lt;= 2017.011.30113<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"184\">Product<\/td>\n<td width=\"184\">Version<\/td>\n<td width=\"184\">Platform<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat DC<\/td>\n<td width=\"184\">2019.010.20091<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat Reader DC<\/td>\n<td width=\"184\">2019.010.20091<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat 2017<\/td>\n<td width=\"184\">2017.011.30120<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"184\">Acrobat Reader 2017<\/td>\n<td width=\"184\">2017.011.30120<\/td>\n<td width=\"184\">Windows and macOS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Reference link:<\/p>\n<p>https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb19-07.html<\/p>\n<h2><strong>\u00a0Solution<\/strong><\/h2>\n<p>Adobe has officially released security updates to fix the preceding vulnerabilities. Users are advised to update their installation to the latest versions as soon as possible.<\/p>\n<p>For vulnerability details and operations, please visit official links of each vulnerable product.<\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com.<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple vulnerabilities in such products as Adobe Flash Player, Adobe Creative Cloud Desktop Application, ColdFusion, and Adobe Acrobat and Reader.<\/p>\n","protected":false},"author":1,"featured_media":7712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[57],"class_list":["post-8093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-adobe-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adobe Security Advisory for February 2019 Security Updates - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-19T04:45:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Adobe Security Advisory for February 2019 Security Updates\",\"datePublished\":\"2019-02-19T04:45:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/\"},\"wordCount\":940,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"keywords\":[\"Adobe Security\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/\",\"name\":\"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"datePublished\":\"2019-02-19T04:45:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"width\":539,\"height\":187,\"caption\":\"Adobe logo with stylized red \\\"A\\\".\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-advisory-for-february-2019-security-updates\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Security Advisory for February 2019 Security Updates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/","og_locale":"pt_BR","og_type":"article","og_title":"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS","og_description":"Overview On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple","og_url":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/","og_site_name":"NSFOCUS","article_published_time":"2019-02-19T04:45:17+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS","twitter_description":"Overview On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Adobe Security Advisory for February 2019 Security Updates","datePublished":"2019-02-19T04:45:17+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/"},"wordCount":940,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","keywords":["Adobe Security"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/","url":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/","name":"Adobe Security Advisory for February 2019 Security Updates - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","datePublished":"2019-02-19T04:45:17+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","width":539,"height":187,"caption":"Adobe logo with stylized red \"A\"."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/adobe-security-advisory-for-february-2019-security-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Adobe Security Advisory for February 2019 Security Updates"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8093"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8093\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7712"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}