Tuesday, October 13, 2020

Adobe Flash Player Critical Security Update Released


Adobe Flashplayer

Adobe released Version 32.0.0.445 of Adobe Flash Player for Windows, macOS, Linux and Chrome OS.  These updates address a critical vulnerability in Adobe Flash Player. Successful exploitation could lead to an exploitable crash, potentially resulting in arbitrary code execution in the context of the current user. 

Release date:  October 13, 2020
Vulnerability identifier:  APSB20-58
Platform:  Windows, Macintosh, Linux and Chrome OS

Update:

*Important Note:  Downloading the update from the Adobe Flash Player Download Center link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras that you do not want.  They are not needed for the Flash Player update.

    Verify Installation

    To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

    Do this for each browser installed on your computer.

    To verify the version of Adobe Flash Player for Android, go to Settings/Applications/Manage Applications/Adobe Flash Player x.x.

    References



    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...









    3 comments:

    Anonymous said...

    Hi, Corrine!

    I just got notification for the updating of the program, but it also said support was ending in a couple months. Will we need to find another source for those who need this kind of program?

    Scott

    Corrine said...

    Hi, Scott.

    The EOL (End of Life) of Adobe Flash Player was actually announced in July, 2017. Since that time, sites that used Flash have replaced it with HTML5.

    Anonymous said...

    Oh. Well, that shows just how late I am to the party. :-D I guess that means it's safe to uninstall after all. Thank you for the reply!