![]() ![]() Severity ratingĪdobe categorizes this as a critical issue. For More information, please refer to Security Bulletin APSB10-22. Adobe is not aware of any attacks exploiting this vulnerability against Adobe Reader or Acrobat to date.Īdobe recommends users of Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.1.85.3, and users of Adobe Flash Player 10.1.92.10 for Android update to Adobe Flash Player 10.1.95.1. There are reports that this vulnerability is being actively exploited in the wild against Adobe Flash Player on Windows. This vulnerability (CVE-2010-2884) could cause a crash and potentially allow an attacker to take control of the affected system. This vulnerability also affects Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh. Security bulletin Security Advisory for Flash PlayerĪ critical vulnerability exists in Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Macintosh, Linux, Solaris, and Adobe Flash Playerġ0.1.92.10 for Android.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |