Adobe Flash Player prior to 13.0.0.277 and 14.x up to and including 17.x prior to 17.0.0.134 on Windows and OS X and prior to 11.2.202.451 on Linux allows malicious users to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
adobe flash_player 15.0.0.239 |
||
adobe flash_player 15.0.0.246 |
||
adobe flash_player 16.0.0.235 |
||
adobe flash_player 15.0.0.167 |
||
adobe flash_player 14.0.0.145 |
||
adobe flash_player 14.0.0.176 |
||
adobe flash_player 16.0.0.287 |
||
adobe flash_player 16.0.0.257 |
||
adobe flash_player |
||
adobe flash_player 14.0.0.125 |
||
adobe flash_player 16.0.0.305 |
||
adobe flash_player 16.0.0.296 |
||
adobe flash_player 15.0.0.189 |
||
adobe flash_player 15.0.0.223 |
||
adobe flash_player 14.0.0.179 |
||
adobe flash_player 15.0.0.152 |
Eyes PoS vendors, web terminals.
Trend Micro researcher Anthony Joe Melgarejo says the sophisticated Angler exploit kit popular in cybercrime circles is now targeting point-of-sale (PoS) systems. It appears to be the first time an exploit kit has included PoS in its list of hackable platforms, putting them alongside the likes of Adobe Flash, Reader, Java, and Internet Explorer as targets crims think are low-hanging fruit. Melgarejo says Angler often establishes a network beachhead with a malvertising campaign targeting web PoS ...