9.3
CVSSv2

CVE-2016-0985

Published: 10/02/2016 Updated: 09/12/2022
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 18.0.0.329 and 19.x and 20.x prior to 20.0.0.306 on Windows and OS X and prior to 11.2.202.569 on Linux, Adobe AIR prior to 20.0.0.260, Adobe AIR SDK prior to 20.0.0.260, and Adobe AIR SDK & Compiler prior to 20.0.0.260 allow malicious users to execute arbitrary code by leveraging an unspecified "type confusion."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

adobe flash_player_desktop_runtime

adobe air_desktop_runtime

adobe air_sdk

adobe air_sdk_\\&_compiler

Vendor Advisories

Adobe Flash Player before 1800329 and 19x and 20x before 2000306 on Windows and OS X and before 112202569 on Linux, Adobe AIR before 2000260, Adobe AIR SDK before 2000260, and Adobe AIR SDK & Compiler before 2000260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion" ...

Exploits

Source: codegooglecom/p/google-security-research/issues/detail?id=701 There is a type confusion vulnerability in the TextField constructor in AS3 When a TextField is constructed, a generic backing object is created and reused when subsequent TextField objects are created However, if an object with the same ID has already been created i ...

Github Repositories

icat for JSON with Golang

icat for JSON with Golang Example package main import ( "fmt" "log" "githubcom/spiegel-im-spiegel/icat4json" ) func main() { json, err := icat4jsonGet(icat4jsonToolICATW) if err != nil { logFatal(err) } data, err := jsonDecode() if err != nil { logFatal(err) } fmtPrintf("Title: %v\n", dataTitle) fmtPrintf(&quo