Page 7 of 294 results (0.056 seconds)

CVSS: 9.3EPSS: 2%CPEs: 13EXPL: 0

Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption vulnerability in the Action Script 3 raster data model. Successful exploitation could lead to arbitrary code execution. Las versiones 26.0.0.131 y anteriores de Adobe Flash Player, presentan una vulnerabilidad explotable de corrupción de memoria en el modelo de datos ráster de Action Script 3. Una explotación con éxito conllevaría a la ejecución de código arbitraria. • http://www.securityfocus.com/bid/99520 http://www.securitytracker.com/id/1038845 https://access.redhat.com/errata/RHSA-2017:1731 https://helpx.adobe.com/security/products/flash-player/apsb17-21.html https://security.gentoo.org/glsa/201707-15 https://access.redhat.com/security/cve/CVE-2017-3099 https://bugzilla.redhat.com/show_bug.cgi?id=1469762 • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 13EXPL: 0

Adobe Flash Player versions 26.0.0.131 and earlier have a security bypass vulnerability related to the Flash API used by Internet Explorer. Successful exploitation could lead to information disclosure. Las versiones 26.0.0.131 y anteriores de Adobe Flash Player, presentan una vulnerabilidad de omisión de seguridad relacionada con la API Flash utilizada por Internet Explorer. Una explotación con éxito conllevaría a la divulgación de información. This vulnerability allows remote attackers to bypass the Enhanced Protected Mode sandbox of vulnerable installations of Adobe Flash Player and disclose file contents. • http://www.securityfocus.com/bid/99519 http://www.securitytracker.com/id/1038845 https://access.redhat.com/errata/RHSA-2017:1731 https://helpx.adobe.com/security/products/flash-player/apsb17-21.html https://security.gentoo.org/glsa/201707-15 https://access.redhat.com/security/cve/CVE-2017-3080 https://bugzilla.redhat.com/show_bug.cgi?id=1469763 •

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 0

Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption vulnerability in the Action Script 2 BitmapData class. Successful exploitation could lead to memory address disclosure. Las versiones 26.0.0.131 y anteriores de Adobe Flash Player, presentan una vulnerabilidad explotable de corrupción de memoria en la clase BitmapData de Action Script 2. La explotación con éxito conllevaría a la divulgación de direcciones de memoria. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. • http://www.securityfocus.com/bid/99523 http://www.securitytracker.com/id/1038845 https://access.redhat.com/errata/RHSA-2017:1731 https://helpx.adobe.com/security/products/flash-player/apsb17-21.html https://security.gentoo.org/glsa/201707-15 https://access.redhat.com/security/cve/CVE-2017-3100 https://bugzilla.redhat.com/show_bug.cgi?id=1469763 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 2%CPEs: 17EXPL: 0

Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution. Flash Player versiones 25.0.0.148 y anteriores de Adobe, presenta una vulnerabilidad de corrupción de memoria explotable en la clase BlendMode. Una explotación con éxito podría conllevar a la ejecución de código arbitraria. • http://www.securityfocus.com/bid/98349 http://www.securitytracker.com/id/1038427 https://access.redhat.com/errata/RHSA-2017:1219 https://helpx.adobe.com/security/products/flash-player/apsb17-15.html https://security.gentoo.org/glsa/201705-12 https://access.redhat.com/security/cve/CVE-2017-3069 https://bugzilla.redhat.com/show_bug.cgi?id=1449340 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 2%CPEs: 17EXPL: 0

Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution. Flash Player versiones 25.0.0.148 y anteriores de Adobe, presenta una vulnerabilidad de corrupción de memoria explotable en la clase Graphics. Una explotación con éxito podría conllevar a la ejecución de código arbitraria. • http://www.securityfocus.com/bid/98349 http://www.securitytracker.com/id/1038427 https://access.redhat.com/errata/RHSA-2017:1219 https://helpx.adobe.com/security/products/flash-player/apsb17-15.html https://security.gentoo.org/glsa/201705-12 https://access.redhat.com/security/cve/CVE-2017-3074 https://bugzilla.redhat.com/show_bug.cgi?id=1449340 • CWE-787: Out-of-bounds Write •