Severity: High 10 February, 2011 Summary: These vulnerabilities affects: Recent versions of Adobe Reader, Acrobat, Shockwave, Flash, and ColdFusion How an attacker exploits it: In various ways, but most commonly by enticing your users into visiting a website containing malicious Flash, Reader, or Shockwave content Impact: In the worst case, an attacker can execute code on … [Read more...]
Researcher releases zero day Shockwave vulnerability and exploit
Yesterday, Adobe released a Security Advisory in response to a grey hat researcher who published details about a zero day vulnerability in Adobe Shockwave. The researcher from Abysssec described a critical memory corruption vulnerability in the popular multimedia rendering application -- and he describe the flaw in very great technical detail. He even posted Proof-of-Concept … [Read more...]
Out-of-Cycle Reader Update Corrects Flash-related Vulnerability: Also Fixes 22 Other Security Vulnerabilities
Summary: This vulnerability affects: Adobe Reader and Acrobat 9.3.4 and earlier, on Windows, Mac, and UNIX computers How an attacker exploits it: Typically, by enticing your users into viewing a maliciously crafted PDF document Impact: An attacker can execute code on your computer, potentially gaining control of it What to do: Install Adobe's … [Read more...]
Early Adobe Flash Update Plugs Zero Day Vulnerability: Reader Update Due Week of October 4
Summary: This vulnerability affects: Adobe Flash Player 10.1.82.76 and earlier for Windows, Mac, Linux, and Solaris. Also affects Flash Player 10.1.92.10 for Android. How an attacker exploits it: By enticing your users to a malicious website Impact: In the worst case, an attacker can execute code on your computer, potentially gaining control of it What … [Read more...]
Adobe Patch Day Delivers Flash and ColdFusion Security Updates
Emergency Reader Update Expected Later this Month 11 August, 2010 Summary: This vulnerability affects: Adobe Flash Player, Flash Media Server, and ColdFusion for Windows, Mac, and UNIX computers How an attacker exploits it: Multiple vectors, such as enticing your users to a malicious website or sending malicious requests to your web server Impact: Various, in the … [Read more...]