If it prompts you to download Shockwave (or in the case of Google Chrome for some reason just automatically downloads the installer), then you don’t have Shockwave installed.To remove Shockwave, grab Adobe’s uninstall tool here.As if that weren’t bad enough, Dormann said it may actually be easier for attackers to exploit Flash vulnerabilities via Shockwave than it is to exploit them directly against the standalone Flash plugin itself.That’s because Shockwave has several modules that don’t opt in to trivial exploit mitigation techniques built into Microsoft Windows, such as Safe SEH.You can follow any comments to this entry through the RSS 2.0 feed. This article was co-authored by our trained team of editors and researchers who validated it for accuracy and comprehensiveness.
If you visit this link and see a short animation, it should tell you which version of Shockwave you have installed.
In the case of Shockwave, there are some mitigations missing in a number of modules, such as Safe SEH.
Because of this, it may be easier to exploit a vulnerability when Flash is hosted by Shockwave, for example.” Adobe spokeswoman Heather Edell confirmed that CERT’s information is correct, and that the next release of Shockwave Player will include the updated version of Flash Player.
Mozilla Firefox users should note that the presence of the “Shockwave Flash” plugin listed in the Firefox Add-ons section denotes an installation of Adobe Flash Player plugin — not Adobe Shockwave Player.
This entry was posted on Wednesday, May 21st, 2014 at am and is filed under Other.