Adobe Shockwave follows Reader with security patch
A couple of weeks after Adobe Reader and Acrobat needed a ‘Patch Tuesday’, Adobe Shockwave has a big security hole leaving millions of users vulnerable.
Adobe has had to patch up another critical vulnerability in one of its software products this time with its Shockwave player.
The flaw could have allowed a remote hacker to take control of a user's system.
It was reported by security researcher Paul Kurczaba through Tipping Point's Zero Day Initiative. Adobe claimed that 450 million internet-enabled desktops have installed Shockwave player.
Adobe Shockwave is a multimedia player that allows users to access applications such as 3D entertainment and interactive product demonstrations.
The fix comes only a couple of weeks after Adobe released a patch for 13 vulnerabilities in Reader and Acrobat as part of a regular patching cycle.
Adobe recommended that Shockwave users on Windows uninstall an earlier version of Shockwave, restart, and install the new version available here.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
The NCSC touts honeypots and ‘cyber deception’ tactics as the key to combating hackersNews Trials to test the real-world effectiveness of cyber deception solutions have produced positive results so far
-
Can data center supply keep up with AI demand?News New research from Goldman Sachs points to a precarious balancing act for data center operators
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Vulnerability management complexity is leaving enterprises at serious riskNews Fragmented data and siloed processes mean remediation is taking too long
-
Beat cyber criminals at their own gameWhitepaper A guide to winning the vulnerability race and protection your organization
-
Same cyberthreat, different storyWhitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Warning issued over “incomplete” fix for Adobe ColdFusion vulnerabilityNews An incomplete fix for a vulnerability disclosure could be placing users at risk, researchers warned
-
Three steps to transforming security operationsWhitepaper How to be more agile, effective, collaborative, and scalable
-
Should your business start a bug bounty program?In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
-
Accessing the XDR realmWhitepaper A guide for MSPs to unleash modern security