For the second time this month, Adobe has released an update for its Flash Player in order to patch up newly discovered security loopholes. This update addresses two critical memory corruption bugs in Adobe Flash Player 184.108.40.206 that can make your system vulnerable to remote attacks. It also enables future security updates to be automatically downloaded for Windows users.
The update fixes two critical memory corruption vulnerabilities that hackers could exploit to remotely take control of your system. An exploit code can be remotely executed on your system if you're running Windows, Mac OS X, Linus, Solaris, or even some versions of Android. However, this is more of a preventative measure as Adobe is not currently aware of any exploit codes for these two particular bugs being available anywhere at this time.
Adobe Flash Player 220.127.116.11 and some earlier versions of Android 4.x are not affected by these issues. Users with other versions are recommended to update to version 11.2 within the next 30 days.
Windows users will also get the option of having future security updates automatically installed. The updater pings Adobe servers every hour to see if there are any new versions of the software. If the server responds with no updates then the hourly pings would stop and the updater checks back 24 hours later.