jalaffa Posted June 14, 2011 Share Posted June 14, 2011 <img src="http://www.nsanedown.com/images/logos/Adobe_Flash_Player.png" class="logo" alt="Adobe Flash Player" title="Adobe Flash Player" /> Adobe Flash Player is a cross-platform browser-based application runtime that delivers uncompromised viewing of expressive applications, content, and videos across screens and browsers. Flash Player delivers breakthrough web experiences to over 98% of Internet users. Adobe Flash Player is now available for Windows, Mac, and Linux operating systems.Thanks to <span style="color: red;">thylacine</span> for the update.<a href="http://www.nsanedown.com/?request=57232098" target="_blank">Download</a> Link to comment Share on other sites More sharing options...
T0nyB Posted June 14, 2011 Share Posted June 14, 2011 Thanks for the share! :) Link to comment Share on other sites More sharing options...
Brrownie Posted June 14, 2011 Share Posted June 14, 2011 Thanks for the heads up...:D Link to comment Share on other sites More sharing options...
SacredCultivator Posted June 14, 2011 Share Posted June 14, 2011 Thanks, but man, still waiting on when native 64-bit support will be available, still using Square Preview from Nov. '10 >< Link to comment Share on other sites More sharing options...
Ultravires Posted June 14, 2011 Share Posted June 14, 2011 I ran the firefox plugin and the IE file through TotalVirus.com and both files actually were detected with something called "Virus/Win32.CrazyPrier.gen" guess these are false positives? Link to comment Share on other sites More sharing options...
jofre Posted June 14, 2011 Share Posted June 14, 2011 Thanks, J. :D Link to comment Share on other sites More sharing options...
toyo Posted June 14, 2011 Share Posted June 14, 2011 Why would you run through TotalVirus files you downloaded directly from Adobe :) Unless they were hacked like right about now, the files are signed and clean. Link to comment Share on other sites More sharing options...
NitramX Posted June 14, 2011 Share Posted June 14, 2011 Thanks for the update Link to comment Share on other sites More sharing options...
Ultravires Posted June 14, 2011 Share Posted June 14, 2011 I always scan the files whether i d/l the files from the official site or not. Link to comment Share on other sites More sharing options...
Jota.Ce Posted June 14, 2011 Share Posted June 14, 2011 Thanks ;) Link to comment Share on other sites More sharing options...
nanana1 Posted June 15, 2011 Share Posted June 15, 2011 Thanks ! More information here : :P Security update available for Adobe Flash PlayerRelease date: June 14, 2011Vulnerability identifier: APSB11-18Summary--------------A critical vulnerability has been identified in Adobe Flash Player 10.3.181.23 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.23 and earlier versions for Android. This memory corruption vulnerability (CVE-2011-2110) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via malicious Web pages.Adobe recommends users of Adobe Flash Player 10.3.181.23 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 10.3.181.26, available now. Adobe expects to make available an update for Adobe Flash Player 10.3.185.23 and earlier versions for Android before the end of the week of June 13, 2011.Note: This issue does not affect the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.3) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems. Link to comment Share on other sites More sharing options...
KotaXor Posted June 15, 2011 Share Posted June 15, 2011 Thanks for the update. Link to comment Share on other sites More sharing options...
implague Posted June 16, 2011 Share Posted June 16, 2011 thanx for the update guys Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.