Last week was marked immediately by two 0day vulnerabilities for Flash. CVE-2013-0633 and CVE-2013-0634 were born. An interesting fact is that presented to the public these 0day were almost simultaneously with the release of the
corresponding update from Adobe, which eliminates them. Thus, from 0day they quickly turned into ex-0day. In particular, one of the first, about the detection of exploits used in attacks on users,
said the company FireEye. These exploits were embedded in .doc MS Word files and in this form were delivered to the user. We define the exploit used in this attack as
Win32 / Exploit.CVE-2013-0634.A .

Officer Adobe application:
')
Adobe Flash Player and Adobe Flash Player 11.5.502.146 and Adobe Flash Player 11.1.115.36 and Adobe Flash Player 11.5.502.146 and Adobe Flash Player and Adobe Flash Player Player 11.1.111.31 and earlier versions for Android 3.x and 2.x. This is an update of the address system.
It is an essay. The exploit for CVE-2013-0633 targets the ActiveX version of Flash Player on Windows.
Maliciously, it was a malicious flashback (SWF). Microsoft Word document entered into an attachment which contains malicious Flash (SWF) content.
Yesterday, Adobe released another update for Flash, which concerns the elimination of already 17 vulnerabilities (!). Full list can be found
here . This time, the update refers to vulnerabilities that have not yet been seen in attacks on users.
Once again, we recommend that users check the version of Flash Player used by your browser, for this you can use the official. adobe source
here or
here . Note that browsers such as Google Chrome and Internet Explorer 10 are automatically updated with the release of the new version of Flash Player. You can get information on updating Flash for your browser via this
link .
Currently current Flash versions for browsers:


be secure.