Adobe has just rolled out its Flash Player 11.2 which will ensure that a couple of critical arbitrary code execution vulnerabilities are fixed, in addition to a silent update option. Before we move on in greater detail concerning the silent update option, let us take a closer look at the patched vulnerabilities. They start off from previous versions of the Flash Player checking out URL security domains which affect only the Flash Player ActiveX plug-in for Internet Explorer on Windows 7 or Vista. These vulnerabilities can result in memory corruptions, and can be used as a backdoor to execute arbitrary code remotely.
Those who run on Adobe Flash Player 18.104.22.168 and earlier versions for Windows, Macintosh, Linux and Solaris platforms have been advised to update to the new Adobe Flash Player 11.2, while folks with the Android operating system have been asked to bump up their Adobe Flash Player 22.214.171.124 to Flash Player 126.96.36.199. I like the fact that it can check for and install updates in the background without requiring you to interact with the software – this is all about making the program ‘smart’, so that folks need not burden themselves with software updates.
|Key Specs||Alcatel Flash|
|Processor/Soc Name||MT6592M, 8-core, 1.4 GHz|
|Max. Total Storage Capacity||40 GB|
|Battery Capacity (mAh)||3200 mAh|
|Complete product data||Alcatel Flash Full specs and details|