Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Latest Internet News»Emergency Flash Player patch fixes actively exploited vulnerability
Latest Internet News

Emergency Flash Player patch fixes actively exploited vulnerability

DeepBy DeepMarch 23, 2016No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Flash Player is frequently targeted in Web-based attacks

Adobe Systems released new versions of Flash Player in order to fix 18 critical vulnerabilities that could be exploited to take over computers, including one flaw that’s already targeted by attackers.

“Adobe is aware of a report that an exploit for CVE-2016-1010 is being used in limited, targeted attacks,” the company said in a security advisory. The flaw stems from a heap overflow condition and was reported to Adobe by researchers from antivirus firm Kaspersky Lab.

Kaspersky Lab did not immediately respond to an inquiry seeking more details about the targeted attacks in which the vulnerability is being exploited.

Adobe advises users to upgrade their Flash Player installations to version 21.0.0.182 for Windows or Mac and version 11.2.202.577 for Linux. The extended support release of Flash Player has also been updated to version 18.0.0.133.

The Flash Player plug-ins bundled with Google Chrome, Internet Explorer and Microsoft Edge will automatically be updated through those browsers’ update mechanisms.

Adobe has also released version 21.0.0.176 of AIR Desktop Runtime, AIR SDK, AIR SDK & Compiler and AIR for Android, which contain Flash Player components.

Flash Player vulnerabilities are a common target for Web-based, drive-by download exploits. Users should configure their browsers to require confirmation before running plug-in-based content such as Flash. This feature is commonly referred to as click-to-play.

[“source-gsmarena”]

actively Emergency exploited fixes Flash patch Player vulnerability
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Deep

Related Posts

4 Tips to Improve Data Loss Prevention (DLP) in Healthcare

April 16, 2025

Choosing the Right Belly Band Holster for Your Body Type

October 1, 2024

How to start a business ledger for new companies in India?

September 24, 2024
Recent Post
  • How to Grow Your Brand with Micro Influencer Marketing
  • What Are the 8 Different Types of Video Game Articles?
  • Strategies for Greater Financial Flexibility: 5 Smart Ways to Repay Your Home Loan Faster
  • PS5 Pro vs the PS5 – What’s the difference, really?
  • 4 Tips to Improve Data Loss Prevention (DLP) in Healthcare
  • A+ methods: Help students get ready for state exams
  • Again, winter greetings
  • Living games are here: How gen AI is leveling up the games industry
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2025 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.