In July, Adobe spent time patching three zero-day vulnerabilities in Flash Player that were found in the data posted online that was stolen in the HackingTeam intrusion. The bug was found in the Apache Flex BlazeDS component of ColdFusion and LiveCycle Data Services. The hotfix, which did not require a reboot, affected ColdFusion 11, Update 5 and earlier, as well as ColdFusion 10, Update 16. 27, Adobe pushed out a hotfix for the same vulnerability, this time in ColdFusion implementations. The vulnerability was found in BlazeDS, web-based messaging technology embedded in LiveCycle Data Services.
![adobe shockwave player 12.2.0.162 adobe shockwave player 12.2.0.162](https://www.itespresso.de/wp-content/uploads/2015/10/adobe-logo-800-250x188.png)
#ADOBE SHOCKWAVE PLAYER 12.2.0.162 FOR MAC#
The software is a development tool that streamlines application development. Adobe Acrobat 11.0.13 Adobe Reader 11.0.13 Adobe Shockwave Player 12.2.0.162 Adobe AIR 19.0.0.213 Apple iTunes 12.3.1 Apple QuickTime 7.7.8 Flash Player 19.0.0.185 Mozilla Firefox 41.0.02 Microsoft Office for Mac 2011 14.5.7 Available UPDATE: Java Runtime Environment 7 update 80 Available UPDATE: Java Runtime Environment 8 update 66 Available. 18, the company released a hotfix for a XML External Entity flaw in LiveCycle Data Services, the former Flex Data Services. This is the third security update from Adobe in as many weeks. The vulnerability affects Shockwave for Windows, versions 12.1.9.160 and earlier and Adobe urges users to update immediately to 12.2.0.162.Īdobe said both vulnerabilities, CVE-2015-66880 and CVE-2015-6681, are memory corruption bugs and could lead to code execution by a remote attacker. Adobe today released a new version of its Shockwave Player that patches two critical vulnerabilities that could be remotely exploited.Īdobe said that it is not aware of public exploits for either security flaw.