![]() ![]() Further information is available via the Adobe web site at This update addresses the issue by updating Adobe Flash Player to version 9.0.47.0. By enticing a user to open maliciously crafted Flash content, an attacker may cause arbitrary code execution. Impact: Opening maliciously crafted Flash content may lead to arbitrary code execution.ĭescription: An input validation issue exists in Adobe Flash Player. To learn about other Security Updates, see " Apple Security Updates." Mac OS X v10.4.11 and Security Update 2007-008Īvailable for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4 through Mac OS X v10.4.10, Mac OS X Server v10.4 through Mac OS X Server v10.4.10 Where possible, CVE IDs are used to reference the vulnerabilities for further information. To learn more about Apple Product Security, see the Apple Product Security website.įor information about the Apple Product Security PGP Key, see " How to use the Apple Product Security PGP Key." This document describes the security content of Mac OS X v10.4.11 and Security Update 2007-008, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.įor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. About the security content of Mac OS X 10.4.11 and Security Update 2007-008 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |