Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adobe flash player desktop runtime vulnerabilities and exploits
(subscribe to this query)
941
VMScore
CVE-2011-0611
Adobe Flash Player prior to 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and previous versions on Android; Adobe AIR prior to 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x prior to 9.4.4 and 10.x up to and including 10.0.1 on Win...
Adobe Flash Player
Adobe Acrobat Reader
Adobe Adobe Air
Adobe Acrobat
Google Chrome
Suse Linux Enterprise Desktop 11
Opensuse Opensuse 11.4
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise Desktop 10
2 EDB exploits
3 Github repositories
4 Articles
935
VMScore
CVE-2017-2985
Adobe Flash Player versions 24.0.0.194 and previous versions have an exploitable use after free vulnerability in the ActionScript 3 BitmapData class. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player
Adobe Flash Player Desktop Runtime
1 EDB exploit
935
VMScore
CVE-2017-2988
Adobe Flash Player versions 24.0.0.194 and previous versions have an exploitable memory corruption vulnerability when performing garbage collection. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player
Adobe Flash Player Desktop Runtime
1 EDB exploit
935
VMScore
CVE-2016-4273
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
1 EDB exploit
890
VMScore
CVE-2020-9633
Adobe Flash Player Desktop Runtime 32.0.0.371 and previous versions, Adobe Flash Player for Google Chrome 32.0.0.371 and previous versions, and Adobe Flash Player for Microsoft Edge and Internet Explorer 32.0.0.330 and previous versions have an use after free vulnerability. Succe...
Adobe Flash Player Desktop Runtime
Adobe Flash Player
1 Article
890
VMScore
CVE-2019-8069
Adobe Flash Player 32.0.0.238 and previous versions versions, 32.0.0.207 and previous versions versions have a Same Origin Method Execution vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.
Adobe Flash Player Desktop Runtime
Adobe Flash Player
1 Article
890
VMScore
CVE-2019-8070
Adobe Flash Player 32.0.0.238 and previous versions versions, 32.0.0.207 and previous versions versions have a Use after free vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.
Adobe Flash Player Desktop Runtime
Adobe Flash Player
1 Article
890
VMScore
CVE-2019-7096
Adobe Flash Player versions 32.0.0.156 and previous versions, 32.0.0.156 and previous versions, and 32.0.0.156 and previous versions have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player Desktop Runtime
Adobe Flash Player
828
VMScore
CVE-2019-7837
Adobe Flash Player versions 32.0.0.171 and previous versions, 32.0.0.171 and previous versions, and 32.0.0.171 and previous versions have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player Desktop Runtime
Adobe Flash Player
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
828
VMScore
CVE-2017-3099
Adobe Flash Player versions 26.0.0.131 and previous versions have an exploitable memory corruption vulnerability in the Action Script 3 raster data model. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player Desktop Runtime
Adobe Flash Player
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »