Page 84 of 615 results (0.011 seconds)

CVSS: 10.0EPSS: 21%CPEs: 9EXPL: 0

Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors. Desbordamiento de buffer basado en pila en Adobe Flash Player anterior a 11.7.700.269 y 11.8.x hasta 12.0.x anterior a 12.0.0.70 en Windows y Mac OS X y anterior a 11.2.202.341 en Linux, Adobe AIR anterior a 4.0.0.1628 en Android, Adobe AIR SDK anterior a 4.0.0.1628, y Adobe AIR SDK & Compiler anterior a 4.0.0.1628 permite a atacantes ejecutar código arbitrario a través de vectores no especificados. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the usage of regular expressions in ActionScript where an expression could overflow a data structure on the stack. An attacker can leverage this vulnerability to execute code under the context of the current process. • http://helpx.adobe.com/security/products/flash-player/apsb14-07.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html http://rhn.redhat.com/errata/RHSA-2014-0196.html http://security.gentoo.org/glsa/glsa-201405-04.xml https://access.redhat.com/security/cve/CVE-2014-0498 https://bugzilla.redhat.com/show_bug.cgi? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 do not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors. Adobe Flash Player anterior a 11.7.700.269 y 11.8.x hasta 12.0.x anterior a 12.0.0.70 en Windows y Mac OS X y anterior a 11.2.202.341 en Linux, Adobe AIR anterior a 4.0.0.1628 en Android, Adobe AIR SDK anterior a 4.0.0.1628 y Adobe AIR SDK & Compiler anterior a 4.0.0.1628 no previenen el acceso a información de direcciones, lo que facilita a atacantes evadir el mecanismo de protección ASLR a través de vectores no especificados. • http://helpx.adobe.com/security/products/flash-player/apsb14-07.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html http://rhn.redhat.com/errata/RHSA-2014-0196.html http://security.gentoo.org/glsa/glsa-201405-04.xml https://access.redhat.com/security/cve/CVE-2014-0499 https://bugzilla.redhat.com/show_bug.cgi? • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 41%CPEs: 9EXPL: 0

Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014. Vulnerabilidad de doble liberación en Adobe Flash Player anterior a 11.7.700.269 y 11.8.x hasta 12.0.x anterior a 12.0.0.70 en Windows y Mac OS X y anterior a 11.2.202.341 en Linux, Adobe AIR anterior a 4.0.0.1628 en Android, Adobe AIR SDK anterior a 4.0.0.1628 y Adobe AIR SDK & Compiler anterior a 4.0.0.1628 permite a atacantes remotos ejecutar código arbitrario a través de vectores no especificados, tal y como se demostró activamente en febrero 2014. Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code. • http://helpx.adobe.com/security/products/flash-player/apsb14-07.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html http://rhn.redhat.com/errata/RHSA-2014-0196.html http://security.gentoo.org/glsa/glsa-201405-04.xml http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day& • CWE-399: Resource Management Errors CWE-415: Double Free •

CVSS: 10.0EPSS: 13%CPEs: 9EXPL: 0

Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak." Adobe Flash Player anteriores a 11.7.700.260 y 11.8.x y 11.9.x anteriores a 12.0.0.38 en Windows y Mac OS X y anteriores a 11.2.202.335 en Linux, Adobe AIR anteriores a 4.0.0.1390, Adobe AIR SDK anteriores a 4.0.0.1390 permite a atacantes evadir el mecanismo de protección ASLR aprovechando un "address leak". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the jump operation code. The issue lies in the failure of the ActionScript Virtual Machine to properly sanitize values before jumping to them. • http://helpx.adobe.com/security/products/flash-player/apsb14-02.html http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html http://rhn.redhat.com/errata/RHSA-2014-0028.html http://secunia.com/advisories/56516 http://secunia.com/advisories/56636 http://www.securitytracker.com/id/1029602 https://access.redhat.com/security/cve/CVE-2014-0492 https://bugzilla.redhat.com/show_bug.cgi?id=1053235 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 0

Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to bypass unspecified protection mechanisms via unknown vectors. Adobe Flash Player anteriores a 11.7.700.260 y 11.8.x y 11.9.x anteriores a 12.0.0.38 en Windows y mac OS X y anteriores a 112.202.335 en Linux, Adobe AIR anteriores a 4.0.0.1390, Adobe AIR SDK anteriores a 4.0.0.1390, y Adobe AIR SDK & Compiler anteriores a 4.0.0.1390 permite a atacantes sortear un mecanismo de protección no especificado a través de vectores desconocidos. • http://helpx.adobe.com/security/products/flash-player/apsb14-02.html http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00006.html http://rhn.redhat.com/errata/RHSA-2014-0028.html http://secunia.com/advisories/56516 http://secunia.com/advisories/56636 http://www.securitytracker.com/id/1029602 https://access.redhat.com/security/cve/CVE-2014-0491 https://bugzilla.redhat.com/show_bug.cgi?id=1053233 • CWE-264: Permissions, Privileges, and Access Controls •