9.3
CVSSv2

CVE-2012-0779

Published: 04/05/2012 Updated: 18/07/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 10.3.183.19 and 11.x prior to 11.2.202.235 on Windows, Mac OS X, and Linux; prior to 11.1.111.9 on Android 2.x and 3.x; and prior to 11.1.115.8 on Android 4.x allows remote malicious users to execute arbitrary code via a crafted file, related to an "object confusion vulnerability," as exploited in the wild in May 2012.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

Vendor Advisories

Synopsis Critical: flash-plugin security update Type/Severity Security Advisory: Critical Topic An updated Adobe Flash Player package that fixes one security issue is nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalse ...

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::R ...
This Metasploit module exploits a vulnerability found in Adobe Flash Player By supplying a corrupt AMF0 "_error" response, it is possible to gain arbitrary remote code execution under the context of the user This vulnerability has been exploited in the wild as part of the "World Uyghur Congress Invitationdoc" e-mail attack According to the advi ...

Github Repositories

Tracking and timelining historic and ongoing People's Republic of China πŸ‡¨πŸ‡³ malware targeting of Uyghur people

ergenekon Tracking and timelining historic and ongoing People's Republic of China πŸ‡¨πŸ‡³ malware targeting of Uyghur people Any malware information is categorised and grouped using the horizontal axis of the Diamond Model Malware file hashes are standardised on SHA256 (where available) Timeline and list of activity is not exhaustive The purpose of this project is t