SuSE: 2010-024: flash player


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) SuSE: 2010-024: flash player
# 1  
Old 06-11-2010
SuSE: 2010-024: flash player

LinuxSecurity.com: Adobe Flash Player was updated to fix multiple critical security vulnerabilities which allow an attacker to remotely execute arbitrary code or to cause a denial of service. The Flash Plugin was upgraded to version 10.1.53.64. The following CVE numbers have been assigned: [More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Flash player

hello, i have downloaded flash player as tar.gz,i dont know how to copy files and paste it to usr/lib/adobe-flashplugin/ , i have download it in my downloads. plz help me. (1 Reply)
Discussion started by: Lee win
1 Replies

2. Solaris

installing flash player

I download the files from Adobe, and place them in /opt/firefox/plugins i made sure to chown and chmod them to be the same as the other 2 plugins that i have in there. when i try to open a file .html that has links to a .swf it keeps asking me to install the player did i do something wrong? (9 Replies)
Discussion started by: deaconf19
9 Replies

3. UNIX for Dummies Questions & Answers

Flash Player

I am completely new to Unix and have a quick question... I have a client that wants me to develop Flash Commercials and Presentations. My question is, does the Linux Flash Player work on the Unix platform? Thanks in advance for your responses! (1 Reply)
Discussion started by: tbgfinancial
1 Replies
Login or Register to Ask a Question
u3-tool(1)						      General Commands Manual							u3-tool(1)

NAME
u3-tool - Tool for controlling the special features of an U3 USB Flash disk. SYNOPSIS
u3-tool [-cdDehiRuvV] [-l cd image ] [-p cd size ] device DESCRIPTION
This tool can be used to control some of the special features of U3 Flash disks. OPTIONS
-c Change current password. -d Disable device security leaving the data intact. The current password is required to perform this command. WARNING: this makes all current data files AND possibly also deleted data public. -D Dump all raw info(for debug) -e Enable device security, protecting all files currently on the data partition using a password. -h Print a short help message. -i Display device information. -l <cd image> Load a new CD image into the cd partition of the device. Make sure the cd partition is big enough to contain the file. Else you'll have to repartition the device using the '-p' option. -p <cd size> Repartition device, reassinging the device space between the cd and data partition. The argument specifies the size of the CD parti- tion. The rest of the device will be assigned to the data partition. The data partition needs reformating after this command has been issued. -R Reset device security destroying private data. This can be used if the device is blocked or the password is lost. -u Unlock secured data partition. This requires the current password. -v Use verbose output -V Print version information u3-tool(1)