Security updates for Adobe Flash Player

Adobe is completely unlucky with its products. There is probably no week for portals to technologically report the next vulnerability patched against the manufacturer or the zero day vulnerability used for Internet attacks. This is especially true for recent events related to Hacking Team, which was the victim of a cyber attack, as a result of which incredible data and information about zero day slots in Adobe Flash Player got to the network.

The information stolen from Hacking Team servers has as many as three previously unknown CVE-2015-5119 nomenclature errors, CVE-2015-5122 and CVE-2015-5123, which were identified in Adobe Flash Player version 18.0.0.204 and older for Windows , Mac OS X and Linux. Effective use of these vulnerabilities can allow an attacker to remotely take control of an attacked system.

  • Adobe Flash Player 18.0.0.203 and earlier for Windows and Macintosh are vulnerable
  • Adobe Flash Player 18.0.0.204 and earlier for Linux with Google Chrome installed
  • Adobe Flash Player Extended Support Release version 13.0.0.302 and earlier 13.x for Windows and Macintosh
  • Adobe Flash Player Extended Support Release version 11.2.202.481 and 11.x for Linux

Madness is recommended:

  1. Adobe software update for the latest versions: https://get.adobe.com/pl/flas…
  2. Or completely remove the problem, and thus the Adobe Flash Player application itself.
  3. Or enabling flash content playback only on demand .


Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.