Cross-site scripting vulnerability discovered in Adobe Flash Player

Ron Condon

Adobe Systems Inc. is taking action to block a cross-site scripting vulnerability in Flash player that it said is being actively exploited by attackers.

    Requires Free Membership to View

Adobe said the vulnerability, rated as important, has been identified in Adobe Flash Player and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player and earlier versions for Android.

The company advises users to upgrade to version Android users will have to wait until later this week to be completely protected.

The universal cross-site scripting vulnerability (CVE-2011-2107) could be used to take actions on a user's behalf on any website or webmail provider, if the user visits a malicious website.  Adobe said there are reports that the vulnerability is already being exploited in the wild in targeted attacks designed to trick users into clicking on a malicious link delivered in an email message.

The company recommends that users of Adobe Flash Player and earlier versions for Windows, Macintosh, Linux and Solaris, should update to Adobe Flash Player ( for ActiveX).

Adobe added that it is still investigating any impact to the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions of Adobe Reader and Acrobat for Windows and Macintosh operating systems. The company says it is not aware of any attacks targeting Adobe Reader or Acrobat in the wild.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: