• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Adobe Flash Player Updated

Adobe Flash Player Updated

2011-11-13 by Jason

In case you missed it on Thursday, an update to Adobe Flash Player was released to patch critical vulnerabilities in the plugin for Windows, Mac, Linux, Solaris and Android platforms.

Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880.

Adobe has also patched Flash Player 10, though it recommends all customers who can to be running version 11. The patched version 10 can be downloaded from the Archived Flash page.

From this update’s security bulletin, vulnerabilities allowed memory corruption, heap corruption, buffer overflows, stack overflows, or a cross-domain policy bypass.

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445).

This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455).

This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456).

This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457).

This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460).

You can find direct downloads to Adobe Flash Player installers in our previous article.

Filed Under: Security and Privacy, Software

Trending

  • Adobe Reader crashes on opening for a standard user
    In Software, Tech Solutions
  • Oculus Rift shows off final retail version
    In Hardware, Gadgets, and Products
  • User Profile Hive Cleanup Service – Fixing log off problems
    In System Administration, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
  • Benefits of End-To-End Testing That Will Match Company Expectations Benefits of End-To-End Testing That Will Match Company Expectations
  • 3 Key Features of Pets Health Monitoring Systems 3 Key Features of Pets Health Monitoring Systems
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in