Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe flash player vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2016-4286
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to bypass intended access restrictions via unspecified vectors.
Adobe Flash Player
Adobe Flash Player Desktop Runtime
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Server 5.0
8.8
CVSSv3
CVE-2016-6982
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
8.8
CVSSv3
CVE-2016-6983
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
8.8
CVSSv3
CVE-2016-6984
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
8.8
CVSSv3
CVE-2016-6985
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
8.8
CVSSv3
CVE-2016-6986
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
8.8
CVSSv3
CVE-2016-6987
Use-after-free vulnerability in Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability ...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
NA
CVE-2016-10142016
Adobe Flash Player versions prior to 22.0.0.192 and 18.0.0.360 suffer from a DLL hijacking vulnerability.
9.8
CVSSv3
CVE-2016-4120
Adobe Flash Player prior to 18.0.0.352 and 19.x up to and including 21.x prior to 21.0.0.242 on Windows and OS X and prior to 11.2.202.621 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Air Sdk \\& Compiler
Adobe Air Sdk
Adobe Flash Player Desktop Runtime
Adobe Air Desktop Runtime
9.8
CVSSv3
CVE-2016-4121
Use-after-free vulnerability in Adobe Flash Player prior to 18.0.0.352 and 19.x up to and including 21.x prior to 21.0.0.242 on Windows and OS X and prior to 11.2.202.621 on Linux allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability ...
Adobe Flash Player
Adobe Air Sdk \\& Compiler
Adobe Air Sdk
Adobe Flash Player Desktop Runtime
Adobe Air Desktop Runtime
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »