Acrobat Pro

Licence: Commercial with demo
Version 10.1.4 | Release Date: 2012-08-14 | Download

A regular quarterly update that provides security mitigations, feature enhancements, and bug fixes.

Version 10.1.3 | Release Date: 2012-04-10 | Download
No changes specified
Version 10.1.2 | Release Date: 2011-01-20 | Download
No changes specified
Version 10.0.0 | Release Date: 2010-10-20 | Download
No changes specified
Version 9.3.1 | Release Date: 2010-02-16 | Download

A critical vulnerability has been identified in Adobe Reader 9.3 for Windows, Macintosh and UNIX, Adobe Acrobat 9.3 for Windows and Macintosh, and Adobe Reader 8.2 and Acrobat 8.2 for Windows and Macintosh. As described in Security Bulletin APSB10-06, this vulnerability (CVE-2010-0186) could subvert the domain sandbox and make unauthorized cross-domain requests. In addition, a critical vulnerability (CVE-2010-0188) has been identified that could cause the application to crash and could potentially allow an attacker to take control of the affected system.

Version 9.2.0 | Release Date: 2009-10-13 | Download

This update resolves a heap overflow vulnerability that could lead to code execution (CVE-2009-3459).
NOTE: There are reports that this issue is being exploited in the wild, via limited, targeted attacks.

This update resolves a memory corruption issue that could potentially lead to code execution (CVE-2009-2985).

This update resolves multiple heap overflow vulnerabilities that could potentially lead to code execution (CVE-2009-2986).

This update resolves an invalid array index issue that could potentially lead to code execution (CVE-2009-2990).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a remote exploitation issue specific to the Mozilla plug-in that could potentially allow an attacker to execute arbitrary code with the privileges of the current user (CVE-2009-2991).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 8.1.7 updates.

This update resolves multiple input validation vulnerabilities that could potentially lead to code execution (CVE-2009-2993).

This update resolves a buffer overflow issue that could potentially lead to code execution (CVE-2009-2994).

This update resolves a heap overflow vulnerability that could potentially lead to code execution (CVE-2009-2997).

This update resolves an input validation issue that could potentially lead to code execution (CVE-2009-2998).

This update resolves an input validation issue that could potentially lead to code execution (CVE-2009-3458).

This update resolves a memory corruption issue that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-3460).
NOTE: this issue is resolved in the Acrobat 9.2 and 8.1.7 updates.

This update resolves an integer overflow that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2989).
NOTE: this issue is resolved in the Acrobat 9.2 and 8.1.7 updates.

This update resolves a memory corruption issue that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-2983).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves an integer overflow that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-2980).

This update resolves a memory corruption issue that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-2996).

This update resolves a Unix-only format bug when running in Debug mode that could lead to arbitrary code execution (CVE-2009-3462).

This update resolves an image decoder issue that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2984).
NOTE: this issue is resolved in the Acrobat 9.2 update.

This update resolves an input validation issue that could potentially lead to a bypass of Trust Manager restrictions (CVE-2009-2981).

This update resolves an issue that could allow a malicious user to bypass file extension security controls. This issue is specific to Acrobat 9.X. (CVE-2009-3461).

This update modifies a certificate that if compromised could potentially be used in a social engineering attack (CVE-2009-2982).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a stack overflow issue that could potentially lead to a Denial of Service (DoS) attack (CVE-2009-3431).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a XMP-XML entity expansion issue that could lead to a Denial of Service (DoS) attack (CVE-2009-2979).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a remote denial of service issue in the ActiveX control specific to the Windows OS (CVE-2009-2987).

This update resolves an input validation issue that could lead to a Denial of Service (DoS) issue (CVE-2009-2988).

This update resolves an input validation issue specific to the ActiveX control that could lead to a Denial of Service (DoS) attack (CVE-2009-2992).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves an integer overflow in that leads to a Denial of Service (DoS). This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2995).

This update resolves a third party web download product that Adobe Reader uses that could potentially lead to local privilege escalation (CVE-2009-2564).

This update resolves a cross-site scripting issue when the browser plugin is used with Google Chrome and Opera browsers (CVE-2007-0048, CVE-2007-0045)

Version 9.1.3 | Release Date: 2009-07-31 | Download

Addresses critical security vulnerabilities while providing more overall stability

Version 9.1.2 | Release Date: 2009-06-09 | Download

Adobe® Acrobat® and Reader® 9.1.2 software address a number of customer workflow issues and security vulnerabilities (please see: http://www.adobe.com/go/apsb09-07/) while providing more stability.

Version 9.1.1 | Release Date: 2009-05-12 | Download
No changes specified
Version 9.1.1 | Release Date: 2009-05-12 | Download
No changes specified
Version 8.1.2 | Release Date: 2008-06-02 | Download

8.1.2
• Closed some potential security vulnerabilities
• Improved Mac OS X v1.5 (Leopard) support
• Resolution of several PDF forms-related issues
• Additional stability improvements

8.1.1
• Address several PDF forms-related issues
• Provide additional stability

Note: download link is only the update.
Version 8.1.1 is here:
http://ardownload.adobe.com/pub/adobe/acrobat/mac/8.x/8.1.1/misc/AcroProUpd811_all.dmg

Version 8.1.1 | Release Date: 2008-01-21 | Download
No changes specified
Version 10.1.1 | Release Date: 2008-01-01 | Download
No changes specified
Version 8.1 | Release Date: 2007-06-04 | Download
  • The Mac OS X version now includes Flash MPP for improved support for Adobe Flash® files with multimedia.
  • The InDesign Plug-In update supports communication with Adobe InDesign for Creative Suite 3.
  • Additional stability improvements have been added.
Version 8.0 | Release Date: 2007-01-13 | Download
No changes specified
Version 7.0.8 | Release Date: 2006-07-11 | Download
No changes specified
Version 9.2.0 | Release Date: 2006-01-01 | Download

This update resolves a heap overflow vulnerability that could lead to code execution (CVE-2009-3459).
NOTE: There are reports that this issue is being exploited in the wild, via limited, targeted attacks.

This update resolves a memory corruption issue that could potentially lead to code execution (CVE-2009-2985).

This update resolves multiple heap overflow vulnerabilities that could potentially lead to code execution (CVE-2009-2986).

This update resolves an invalid array index issue that could potentially lead to code execution (CVE-2009-2990).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a remote exploitation issue specific to the Mozilla plug-in that could potentially allow an attacker to execute arbitrary code with the privileges of the current user (CVE-2009-2991).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 8.1.7 updates.

This update resolves multiple input validation vulnerabilities that could potentially lead to code execution (CVE-2009-2993).

This update resolves a buffer overflow issue that could potentially lead to code execution (CVE-2009-2994).

This update resolves a heap overflow vulnerability that could potentially lead to code execution (CVE-2009-2997).

This update resolves an input validation issue that could potentially lead to code execution (CVE-2009-2998).

This update resolves an input validation issue that could potentially lead to code execution (CVE-2009-3458).

This update resolves a memory corruption issue that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-3460).
NOTE: this issue is resolved in the Acrobat 9.2 and 8.1.7 updates.

This update resolves an integer overflow that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2989).
NOTE: this issue is resolved in the Acrobat 9.2 and 8.1.7 updates.

This update resolves a memory corruption issue that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-2983).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves an integer overflow that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-2980).

This update resolves a memory corruption issue that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-2996).

This update resolves a Unix-only format bug when running in Debug mode that could lead to arbitrary code execution (CVE-2009-3462).

This update resolves an image decoder issue that leads to a Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be possible. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2984).
NOTE: this issue is resolved in the Acrobat 9.2 update.

This update resolves an input validation issue that could potentially lead to a bypass of Trust Manager restrictions (CVE-2009-2981).

This update resolves an issue that could allow a malicious user to bypass file extension security controls. This issue is specific to Acrobat 9.X. (CVE-2009-3461).

This update modifies a certificate that if compromised could potentially be used in a social engineering attack (CVE-2009-2982).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a stack overflow issue that could potentially lead to a Denial of Service (DoS) attack (CVE-2009-3431).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a XMP-XML entity expansion issue that could lead to a Denial of Service (DoS) attack (CVE-2009-2979).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves a remote denial of service issue in the ActiveX control specific to the Windows OS (CVE-2009-2987).

This update resolves an input validation issue that could lead to a Denial of Service (DoS) issue (CVE-2009-2988).

This update resolves an input validation issue specific to the ActiveX control that could lead to a Denial of Service (DoS) attack (CVE-2009-2992).
NOTE: this issue is resolved in the Adobe Reader and Acrobat 9.2 and 8.1.7 updates.

This update resolves an integer overflow in that leads to a Denial of Service (DoS). This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2995).

This update resolves a third party web download product that Adobe Reader uses that could potentially lead to local privilege escalation (CVE-2009-2564).

This update resolves a cross-site scripting issue when the browser plugin is used with Google Chrome and Opera browsers (CVE-2007-0048, CVE-2007-0045)