9.3

CVE-2011-0609

Warning

Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.

Data is provided by the National Vulnerability Database (NVD)
AdobeFlash Player Version <= 10.2.154.13
   ApplemacOS X Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
   OracleSolaris Version-
AdobeFlash Player Version <= 10.1.106.16
   GoogleAndroid Version-
AdobeAcrobat Version >= 9.0 <= 9.4.2
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Version10.0
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Version10.0.1
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version >= 9.0 <= 9.4.2
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version10.0
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version10.0.1
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAir Version <= 2.5.1
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
OpensuseOpensuse Version11.4
SuseLinux Enterprise Version10.0 Updatesp3
SuseLinux Enterprise Version11.0 Updatesp1
GoogleChrome Version < 10.0.648.134
   ApplemacOS Version-
   GoogleChrome Os Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-

08.06.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Adobe Flash Player Unspecified Vulnerability

Vulnerability

Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

Description

The impacted product is end-of-life and should be disconnected if still in use.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 92.4% 0.997
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
http://www.kb.cert.org/vuls/id/192052
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/46860
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1025210
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1025211
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1025238
Third Party Advisory
Broken Link
VDB Entry