NA
CVSSv3

CVE-2006-0024

CVSSv4: NA | CVSSv3: NA | CVSSv2: 5.1 | VMScore: 610 | EPSS: 0.6631 | KEV: Not Included
Published: 15/03/2006 Updated: 21/11/2024

Vulnerability Summary

Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and previous versions allow remote malicious users to execute arbitrary code via a crafted SWF file.

Vulnerable Product Search on Vulmon Subscribe to Product

macromedia flash player

macromedia flash player 4.0 r12

macromedia flash player 5.0

macromedia flash player 5.0 r50

macromedia flash player 6.0

macromedia flash player 6.0.29.0

macromedia flash player 6.0.40.0

macromedia flash player 6.0.47.0

macromedia flash player 6.0.65.0

macromedia flash player 6.0.79.0

macromedia flash player 7.0.19.0

macromedia flash player 7.0.60.0

macromedia flash player 7.0.61.0

macromedia flash player 7.0 r19

Vendor Advisories

Debian Bug report logs - #357038 CVE-2006-0024 addresses several security vulnerabilities Package: flashplugin-nonfree; Maintainer for flashplugin-nonfree is Bart Martens <bartm@debianorg>; Source for flashplugin-nonfree is src:flashplugin-nonfree (PTS, buildd, popcon) Reported by: Daniel Leidert <danielleidert@wgddde& ...

References

NVD-CWE-Otherhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357038https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/945060https://www.first.org/epsshttp://docs.info.apple.com/article.html?artnum=307179http://lists.apple.com/archives/security-announce/2006/May/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlhttp://secunia.com/advisories/19198http://secunia.com/advisories/19218http://secunia.com/advisories/19259http://secunia.com/advisories/19328http://secunia.com/advisories/20045http://secunia.com/advisories/20077http://secunia.com/advisories/28136http://securitytracker.com/id?1015770http://www.gentoo.org/security/en/glsa/glsa-200603-20.xmlhttp://www.kb.cert.org/vuls/id/945060http://www.macromedia.com/devnet/security/security_zone/apsb06-03.htmlhttp://www.novell.com/linux/security/advisories/2006_15_flashplayer.htmlhttp://www.opera.com/docs/changelogs/windows/854/http://www.osvdb.org/23908http://www.redhat.com/support/errata/RHSA-2006-0268.htmlhttp://www.securityfocus.com/bid/17106http://www.securityfocus.com/bid/17951http://www.us-cert.gov/cas/techalerts/TA06-075A.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-129A.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-132A.htmlhttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlhttp://www.vupen.com/english/advisories/2006/0952http://www.vupen.com/english/advisories/2006/1262http://www.vupen.com/english/advisories/2006/1744http://www.vupen.com/english/advisories/2006/1779http://www.vupen.com/english/advisories/2007/4238https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020https://exchange.xforce.ibmcloud.com/vulnerabilities/25005https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922http://docs.info.apple.com/article.html?artnum=307179http://lists.apple.com/archives/security-announce/2006/May/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlhttp://secunia.com/advisories/19198http://secunia.com/advisories/19218http://secunia.com/advisories/19259http://secunia.com/advisories/19328http://secunia.com/advisories/20045http://secunia.com/advisories/20077http://secunia.com/advisories/28136http://securitytracker.com/id?1015770http://www.gentoo.org/security/en/glsa/glsa-200603-20.xmlhttp://www.kb.cert.org/vuls/id/945060http://www.macromedia.com/devnet/security/security_zone/apsb06-03.htmlhttp://www.novell.com/linux/security/advisories/2006_15_flashplayer.htmlhttp://www.opera.com/docs/changelogs/windows/854/http://www.osvdb.org/23908http://www.redhat.com/support/errata/RHSA-2006-0268.htmlhttp://www.securityfocus.com/bid/17106http://www.securityfocus.com/bid/17951http://www.us-cert.gov/cas/techalerts/TA06-075A.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-129A.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-132A.htmlhttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlhttp://www.vupen.com/english/advisories/2006/0952http://www.vupen.com/english/advisories/2006/1262http://www.vupen.com/english/advisories/2006/1744http://www.vupen.com/english/advisories/2006/1779http://www.vupen.com/english/advisories/2007/4238https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020https://exchange.xforce.ibmcloud.com/vulnerabilities/25005https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922