Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Adobe Flash NPAPI

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Programs

Relating to this vendor:
Adobe Systems
And, this specific program:
Adobe Flash Player 11.x

This thread has been marked as locked.
nalp30 Adobe Flash NPAPI
Member 18th Apr, 2013 20:08
Ranking: 0
Posts: 8
User Since: 24th Nov, 2008
System Score: N/A
Location: N/A
I am getting a recurring message to update Adobe Flash NPAPI. I cannot find such a download on the Adobe website. Searching the internet finds messages saying that this is an integral part of Google Chrome and that I should update date Chrome. I've done that and still get the same message about the NPAPI version of Flash after rescanning. I'm going round in circles with no solution. Help!!

mogs RE: Adobe Flash NPAPI
Expert Contributor 18th Apr, 2013 21:09
Score: 2265
Posts: 6,266
User Since: 22nd Apr 2009
System Score: 100%
Location: UK
@nalp3

As follows is a entry from the FAQ :-
The Secunia PSI has detected a program somewhere on my computer, but where?
To locate a detected program via the Secunia PSI, please do the following.

Secunia PSI 3.x
Right-click on the software you want to check. Select "Show details". Double-click the file location.

Secunia PSI 2.x
Go to "Scan Results" and click the “+” character next to the relevant program. Then click the yellow “Open folder” icon.

Secunia PSI 1.x
In the upper right corner click "Advanced" and "Ok" to the message box. Go to the tab where the relevant program is currently showing up. Click the “+” character next to the relevant program and then click “Open Folder”.

If you have followed the steps above you should now see the folder on your computer where the detected program is located. The Secunia PSI has also showed you the exact installation path and the name of the detected file. To examine the file you can right-click on it and choose Properties. The tabs should now show you the same information that the PSI is detecting including product name, product version etc.
http://secunia.com/vulnerability_scanning/personal...

It might be worth noting that Chrome does not remove the previous/older version when updating.....although if that were the cause.....psi would likely detect Chrome in it's entirety.

Hope it helps.....regards......mogs



--
Was this reply relevant?
+4
-0
nalp30 RE: Adobe Flash NPAPI
Member 18th Apr, 2013 21:43
Score: 0
Posts: 8
User Since: 24th Nov 2008
System Score: N/A
Location: N/A
I've done as you say and found the following file:

NPSWF32_11_6_602_180.dll

which is described as Macromedia Flash and was apparently last updated in March 2013.

But what do I do to update it now?
Was this reply relevant?
+0
-0
mogs RE: Adobe Flash NPAPI
Expert Contributor 18th Apr, 2013 21:58
Score: 2265
Posts: 6,266
User Since: 22nd Apr 2009
System Score: 100%
Location: UK
@nalp30

If you check the plug-ins you've got in Chrome by copying and pasting...chrome://plugins/ into the omnibox : you should see the current version of Flash Player in there.
If that is suffice for your needs....you can right click on the old file and delete it....then run another psi scan.

Hope it helps..........

--
Was this reply relevant?
+0
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer