Page 217 of 1094 results (0.013 seconds)

CVSS: 2.6EPSS: 19%CPEs: 1EXPL: 0

Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to cause a denial of service (browser crash) via a malformed, compressed .swf file, a different issue than CVE-2006-3587. Vulnerabilidad no especificada en Adobe (Macromedia) Flash Player 8.0.24.0 permite a atacantes remotos provocar una denegación de servicio (caída del navegador) mediante un fichero .swf comprimido mal formado, un asunto diferente de CVE-2006-3587. • http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://secunia.com/advisories/21865 http://secunia.com/advisories/21901 http://secunia.com/advisories/22054 http://secunia.com/advisories/22187 http://secunia.com/advisories/22268 http://secunia.com/advisories/22882 http://security.gentoo.org/glsa/glsa-200610-02.xml http://securitytracker.com/id?1016449 http://securitytracker.com/id?1016829 http://www.adobe.com/support/security/bulletins/apsb06-11.html http&# •

CVSS: 5.1EPSS: 12%CPEs: 1EXPL: 0

Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to execute arbitrary commands via a malformed .swf file that results in "multiple improper memory access" errors. Vulnerabilidad no especificada en Adobe (Macromedia) Flash Player 8.0.24.0 permite a atacantes remotos ejecutar comandos de su elección mediante un archivo .swf mal formado que resulta en "múltiples errores de acceso inapropiado a memoria". • http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://secunia.com/advisories/20971 http://secunia.com/advisories/21865 http://secunia.com/advisories/21901 http://secunia.com/advisories/22054 http://secunia.com/advisories/22187 http://secunia.com/advisories/22268 http://secunia.com/advisories/22882 http://security.gentoo.org/glsa/glsa-200610-02.xml http://securitytracker.com/id?1016448 http://securitytracker.com/id?1016829 http://www.adobe.com/support •

CVSS: 5.1EPSS: 50%CPEs: 14EXPL: 0

Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and earlier allow remote attackers to execute arbitrary code via a crafted SWF file. • http://docs.info.apple.com/article.html?artnum=307179 http://lists.apple.com/archives/security-announce/2006/May/msg00003.html http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html http://secunia.com/advisories/19198 http://secunia.com/advisories/19218 http://secunia.com/advisories/19259 http://secunia.com/advisories/19328 http://secunia.com/advisories/20045 http://secunia.com/advisories/20077 http://secunia.com/advisories/28136 http://securitytracker.com/id?10 •

CVSS: 7.5EPSS: 92%CPEs: 8EXPL: 3

Macromedia Flash plugin (1) Flash.ocx 7.0.19.0 (Windows) and earlier and (2) libflashplayer.so before 7.0.25.0 (Unix) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via parameters to the ActionDefineFunction ActionScript call in a SWF file, which causes an improper memory access condition, a different vulnerability than CVE-2005-2628. • https://www.exploit-db.com/exploits/1331 http://marc.info/?l=bugtraq&m=113140426614670&w=2 http://secunia.com/advisories/17430 http://secunia.com/advisories/17437 http://secunia.com/advisories/17481 http://secunia.com/advisories/17626 http://secunia.com/advisories/17738 http://securityreason.com/securityalert/149 http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html http://www.microsoft.com/technet/security/advisory/910550.mspx http://www.sec-consult.com/22 • CWE-20: Improper Input Validation •

CVSS: 5.1EPSS: 93%CPEs: 8EXPL: 0

Macromedia Flash 6 and 7 (Flash.ocx) allows remote attackers to execute arbitrary code via a SWF file with a modified frame type identifier that is used as an out-of-bounds array index to a function pointer. • http://lists.apple.com/archives/security-announce/2006/May/msg00003.html http://secunia.com/advisories/17430 http://secunia.com/advisories/17437 http://secunia.com/advisories/17481 http://secunia.com/advisories/17626 http://secunia.com/advisories/17738 http://secunia.com/advisories/20045 http://secunia.com/advisories/20077 http://securitytracker.com/id?1015156 http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml http://www.kb.cert.org/vuls/id/146284 http://www •