Monday, November 25, 2024
HomeCVE/vulnerabilityAdobe patches Multiple Security Flaw in Flash Player and Adobe Connect

Adobe patches Multiple Security Flaw in Flash Player and Adobe Connect

Published on

Adobe releases patches for critical security flaws which allows attackers to control your system. This bundle applies for Windows, Macintosh, Linux and Chrome OS.

Flash Player Security Update – APSB17-21

These critical vulnerabilities affected Adobe Flash Player Desktop Runtime, Adobe Flash Player for Google Chrome running with versions of 26.0.0.131 and earlier, also Adobe Flash Player for Microsoft Edge and Internet Explorer 11 running version 26.0.0.120 and earlier.

Vulnerability CategoryVulnerability ImpactSeverityCVE Numbers
Security BypassInformation DisclosureImportantCVE-2017-3080
Memory CorruptionRemote Code ExecutionCriticalCVE-2017-3099
Memory CorruptionMemory address disclosureImportantCVE-2017-3100

Users are asked to updated Adobe Flash Player Desktop Runtime running on Windows, Macintosh and Linux to version 26.0.0.137.

- Advertisement - SIEM as a Service

Also Read Sources to Trace New Vulnerabilities

Adobe Connect Security Update – APSB17-22

Security Update released for Adobe Connect which resolves input validation vulnerabilities (CVE-2017-3102, CVE-2017-3103) that results in reflected and stored cross-site scripting attacks.Also this update includes Mitigation for clickjacking attacks (CVE-2017-3101).

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
User Interface (UI) Misrepresentation of Critical InformationClickjacking attacksModerateCVE-2017-3101
Improper Neutralization of Input During Web Page GenerationCross-site scripting attacksImportantCVE-2017-3102
Improper Neutralization of Input During Web Page GenerationCross-site scripting attacksImportantCVE-2017-3103

Affected version 9.6.1 and users are recommended to update with version 9.6.2.

Also Read Multiple Vulnerabilities with Pre-installed Packages open Dell systems to Hack

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip,...

Helldown Ransomware Attacking VMware ESXi And Linux Servers

Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August...

Volt Typhoon Attacking U.S. Critical Infra To Maintain Persistent Access

Volt Typhoon, a Chinese state-sponsored threat actor, targets critical infrastructure sectors like communications, energy,...