Sharing is caring!

It seems that Adobe is continuously working on its Flash Player in order to make sure that it fixes all security issues and bugs that are found in this software. However, it seems that these issues never end and they keep finding more and more security breaches that allowed hackers to remotely control your computer.

The new Flash Player update is fixing 17 vulnerabilities and 16 of them are critical and can be exploited to execute malicious code on the affected computer. CVE-2016-7892 is one of these vulnerabilities, which is already used by hackers.

The company claimed that it knows that the exploit for CVE-2016-7892 is already being used in limited, targeted attacks against users that run the Internet Explorer (32bit) on Windows OS. However, this vulnerability was reported anonymously to the company, so we’re not sure yet who found it and why did he report it.

If you are using the Flash Player on your Linux, macOS or Windows machine, you should definitely update to version as soon as possible. We remind you that the Flash Player plugin comes along with Internet Explorer and Google Chrome on Windows 8.1 and Windows 10 and it will be updated automatically via the update mechanisms of the mentioned browsers.

This Tuesday, the company has also patched some issues on the following products: Adobe Experience Manager, Experience Manager Forms, InDesign, Digital Editions, ColdFusion Builder, DNG Converter, RoboHelp and Animate. We should mention that these products are used in most corporate environments, so it is very important to update them if you are using them on your company’s computers.

However, let’s go back to Adobe Flash Player and all bugs and security issues that it has. According to reports, the HTML5 has started being preferred by big companies such as YouTube.

In other words, the new HTML5 will most likely take Adobe Flash Player’s place sometime in the near future (most likely until the middle of 2017).