Severity: High Summary: These vulnerabilities affect: Flash Player and ColdFusion 1o How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious files or visit specially crafted web sites Impact: Various results; in the worst case, an attacker can gain complete control of your computer What to do: Install the appropriate Adobe … [Read more...]
Shockwave Update Corrects Five Buffer Overflows
Summary: This vulnerability affects: Adobe Shockwave Player 11.6.7.637 and earlier, running on Windows and Macintosh computers How an attacker exploits it: By enticing your users into visiting a website containing a malicious Shockwave content Impact: An attacker can execute code on your computer, potentially gaining control of it What to do: If you allow the use of … [Read more...]
Adobe Patch Day: Updates for Reader X, Flash, and Shockwave Player
Severity: High Summary: These vulnerabilities affect: Shockwave Player, Flash Player, Reader X, and Acrobat X How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious files or visit specially crafted web sites Impact: Various results; in the worst case, an attacker can gain complete control of your computer What to … [Read more...]
Adobe Patch Day: Shockwave, Flash Professional, Photoshop, and Illustrator Updates
Severity: High Summary: These vulnerabilities affect: Adobe Shockwave Player, Flash Professional, Photoshop, and Illustrator How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious files or visit specially crafted web sites Impact: Various results; in the worst case, an attacker can gain complete control of your … [Read more...]
Grab Adobe's Shockwave Update to Avoid Web-based Attacks
Summary: This vulnerability affects: Adobe Shockwave Player 11.6.3.633 and earlier, running on Windows and Macintosh computers How an attacker exploits it: By enticing your users into visiting a website containing a malicious Shockwave content Impact: An attacker can execute code on your computer, potentially gaining control of it What to do: If you allow the use of … [Read more...]