{"id":935,"date":"2010-10-08T10:46:29","date_gmt":"2010-10-08T02:46:29","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/10\/08\/adobe-vulnerabilities\/"},"modified":"2010-10-08T10:46:29","modified_gmt":"2010-10-08T02:46:29","slug":"adobe-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=935","title":{"rendered":"Adobe\u4fee\u88dc23\u500b\u6f0f\u6d1e\u3000\u9810\u544a\u6c99\u7bb1\u5b89\u5168\u6280\u8853"},"content":{"rendered":"<p>\u9019\u5169\u5e74Adobe\u7684Flash Player\u53caAcrobat\/Reader\u983b\u906d\u99ed\u5ba2\u5229\u7528\u505a\u70ba\u653b\u64ca\u7684\u8a98\u990c\u8207\u8df3\u677f\uff0c\u56e0\u6b64\u8a72\u516c\u53f8\u5728\u4e03\u6708\u5ba3\u5e03\u5c07\u5728\u4e0b\u4e00\u7248\u672c\u7684Acrobat\/Reader\u4e2d\u4f7f\u7528\u300c\u6c99\u7bb1\u300d\u6280\u8853\u3002<\/p>\n<p>Adobe\u5468\u4e00\uff0810\/5\uff09\u91cb\u51faAcrobat\/Reader\u66f4\u65b0\uff0c\u66f4\u65b0\u7bc4\u570d\u6db5\u84cb\u6240\u6709\u4f5c\u696d\u7cfb\u7d71\u5e73\u53f0\uff0cAdobe\u5efa\u8b70Acrobat\/Reader 9.3.4\u53ca\u4e4b\u524d\u7248\u672c\u7684\u4f7f\u7528\u8005\u5747\u61c9\u66f4\u65b0\uff0cAcrobat 8.2.4\u53ca\u4e4b\u524d\u7248\u672c\u82e5\u7121\u6cd5\u4f7f\u7528\u6700\u65b0\u7248\u672c\uff0c\u5247\u5efa\u8b70\u66f4\u65b0\u81f38.2.5\u3002<\/p>\n<p>Adobe\u539f\u8a0210\u670812\u65e5\u767c\u4f48Acrobat\/Reader\u7684\u5b9a\u671f\u66f4\u65b0\uff0c\u4f46\u5728\u4e5d\u6708\u521d\u767c\u73fe\u99ed\u5ba2\u85c9\u7531\u96fb\u5b50\u90f5\u4ef6\u593e\u5e36PDF\u6a94\u6848\u9032\u884c\u653b\u64ca\u4e4b\u5f8c\uff0c\u63d0\u65e9\u5b8c\u6210\u4e26\u91cb\u51fa\u5b89\u5168\u66f4\u65b0\u3002\u9019\u6b21\u7e3d\u5171\u4fee\u88dc23\u500b\u6f0f\u6d1e\uff0c\u5927\u90e8\u5206\u6f0f\u6d1e\u90fd\u53ef\u80fd\u5c0e\u81f4\u96fb\u8166\u7576\u6a5f\u6216\u906d\u99ed\u5ba2\u63a7\u5236\u3002Adobe\u5728\u5b89\u5168\u901a\u544a\u4e2d\u8868\u793a\uff0c\u82e5\u6c92\u6709\u5176\u4ed6\u91cd\u5927\u56e0\u7d20\uff0c\u4e0b\u6b21\u66f4\u65b0\u9810\u8a08\u662f\u5728\u660e\u5e742 \u67088\u65e5\uff0c\u6bd4\u539f\u672c\u6bcf\u5b63\u4e00\u6b21\u7684\u983b\u7387\u591a\u5ef6\u5f8c\u4e00\u500b\u6708\u3002<\/p>\n<p>\u9019\u5169\u5e74Adobe\u7684Flash Player\u53caAcrobat\/Reader\u983b\u906d\u99ed\u5ba2\u5229\u7528\u505a\u70ba\u653b\u64ca\u7684\u8a98\u990c\u8207\u8df3\u677f\uff0c\u56e0\u6b64\u8a72\u516c\u53f8\u5728\u4e03\u6708\u5ba3\u5e03\u5c07\u5728\u4e0b\u4e00\u7248\u672c\u7684Acrobat\/Reader\u4e2d\u4f7f\u7528\u300c\u6c99\u7bb1\u300d\u6280\u8853\u3002\u5728\u767c\u4f48\u9019\u6b21\u66f4\u65b0\u901a\u544a\u7684\u540c\u65e5\uff0c\u5728\u90e8\u843d\u683c\u516c\u5e03\u8a72\u516c\u53f8\u7b2c\u4e00\u7bc7\u95dc\u65bc\u6c99\u7bb1\u6280\u8853\u7684\u8aaa\u660e\u3002<\/p>\n<p>Adobe\u5c07\u57fa\u65bcGoogle\u700f\u89bd\u5668\u7684\u6c99\u7bb1\u6280\u8853\u4f86\u6253\u9020\u5b89\u5168\u66f4\u65b0\uff0c\u4e26\u53c3\u8003\u5fae\u8edfOffice 2010\u7684\u4fdd\u8b77\u6a21\u5f0f\u3002\u5c46\u6642\u6240\u6709\u7a0b\u5e8f\u90fd\u4ee5\u6b63\u5e38\u904b\u4f5c\u6240\u9808\u7684\u6700\u4f4e\u6b0a\u9650\u8207\u8cc7\u6e90\u57f7\u884c\uff0c\u800c\u4efb\u4f55\u884c\u70ba\u5728\u88ab\u9a57\u8b49\u4e4b\u524d\uff0c\u53ea\u8981\u662f\u6c99\u7bb1\u4e4b\u5916\u7684\u4efb\u4f55\u52d5\u4f5c\u90fd\u6703\u88ab\u8996\u70ba\u60e1\u610f\u884c\u70ba\u3002<\/p>\n<p>\u4e0d\u904e\u8a72\u6587\u4ea6\u63d0\u53ca\u6240\u6709\u7684\u4fdd\u8b77\u6280\u8853\u5747\u8207\u4f5c\u696d\u7cfb\u7d71\u606f\u606f\u76f8\u95dc\uff0cAdobe\u6307\u51fa\u7b2c\u4e00\u7248\u7684\u6c99\u7bb1\u6280\u8853\u4ecd\u7121\u6cd5\u5b8c\u5168\u65b7\u7d55\u60e1\u610f\u8edf\u9ad4\u53bb\u57f7\u884c\u4e0b\u5217\u52d5\u4f5c\uff1a\u8b80\u53d6\u6a94\u6848\u7cfb\u7d71\u8207Registry\u3001\u4f7f\u7528\u7db2\u8def\u3001\u8b80\u5beb\u526a\u8cbc\u7c3f\u5167\u5bb9\u3001\u914d\u7f6e\u4e0d\u7576\u7684\u4f5c\u696d\u7cfb\u7d71\u8a2d\u5b9a\u3002\uff08\u7de8\u8b6f\/<a target=\"_blank\" href=\"http:\/\/www.ithome.com.tw\/itadm\/article.php?c=63787\" rel=\"noopener\"> iThome<\/a> \u6c88\u7d93\uff09<br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9019\u5169\u5e74Adobe\u7684Flash Player\u53caAcrobat\/Reader\u983b\u906d\u99ed\u5ba2\u5229\u7528\u505a\u70ba\u653b\u64ca\u7684\u8a98\u990c\u8207\u8df3\u677f\uff0c\u56e0\u6b64 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-935","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=935"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}