4.3
CVSSv2

CVE-2017-3000

Published: 14/03/2017 Updated: 24/01/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 386
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Adobe Flash Player versions 24.0.0.221 and previous versions have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

adobe flash_player_desktop_runtime

Vendor Advisories

Synopsis Critical: flash-plugin security update Type/Severity Security Advisory: Critical Topic An update for flash-plugin is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring Syst ...
A random number generator vulnerability used for constant blinding that could lead to information disclosure has been found in Adobe Flash Player <= 2400221 ...

Github Repositories

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

cvelist fork for integration testing

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

Pilot program for CVE submission through GitHub

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023

Warning: CVE Record Submission via Pilot PRs ending 6/30/2023 CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are

cvelist fork for develeoper testing

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

Pilot program for CVE submission through GitHub

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con

A full exploit of CVE-2017-3000 on Flash Player Constant Blinding PRNG

CVE-2017-3000 A full exploit of CVE-2017-3000 on Flash Player Constant Blinding PRNG Insert WANG and wang into dynamically generated code heap in the end

Pilot program for CVE submission through GitHub

CVE Automation Working Group Git Pilot The CVE Automation Working Group is piloting use of git to share information about public vulnerabilities The goal is to learn not only what features are necessary to support the "plumbing" of sending and receiving the data, but also which attributes and metadata are needed in the CVE format to support automation See How to Con