Page 10 of 47 results (0.007 seconds)

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 0

Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to bypass unspecified protection mechanisms via unknown vectors. Adobe Flash Player anteriores a 11.7.700.260 y 11.8.x y 11.9.x anteriores a 12.0.0.38 en Windows y mac OS X y anteriores a 112.202.335 en Linux, Adobe AIR anteriores a 4.0.0.1390, Adobe AIR SDK anteriores a 4.0.0.1390, y Adobe AIR SDK & Compiler anteriores a 4.0.0.1390 permite a atacantes sortear un mecanismo de protección no especificado a través de vectores desconocidos. • http://helpx.adobe.com/security/products/flash-player/apsb14-02.html http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html http://rhn.redhat.com/errata/RHSA-2014-0028.html http://secunia.com/advisories/56516 http://secunia.com/advisories/56636 http://www.securitytracker.com/id/1029602 https://access.redhat.com/security/cve/CVE-2014-0491 https://bugzilla.redhat.com/show_bug.cgi?id=1053233 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 13%CPEs: 9EXPL: 0

Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak." Adobe Flash Player anteriores a 11.7.700.260 y 11.8.x y 11.9.x anteriores a 12.0.0.38 en Windows y Mac OS X y anteriores a 11.2.202.335 en Linux, Adobe AIR anteriores a 4.0.0.1390, Adobe AIR SDK anteriores a 4.0.0.1390 permite a atacantes evadir el mecanismo de protección ASLR aprovechando un "address leak". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the jump operation code. The issue lies in the failure of the ActionScript Virtual Machine to properly sanitize values before jumping to them. • http://helpx.adobe.com/security/products/flash-player/apsb14-02.html http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html http://rhn.redhat.com/errata/RHSA-2014-0028.html http://secunia.com/advisories/56516 http://secunia.com/advisories/56636 http://www.securitytracker.com/id/1029602 https://access.redhat.com/security/cve/CVE-2014-0492 https://bugzilla.redhat.com/show_bug.cgi?id=1053235 • CWE-264: Permissions, Privileges, and Access Controls •