Download
| Alert*
oval:org.secpod.oval:def:17005
The host is installed with Adobe Flash Player before 11.7.700.272 or 11.8.x through 12.0.x before 12.0.0.77 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to handle certain unspecified vectors. Successful exploitation allows attackers to bypass the Same O ... oval:org.secpod.oval:def:17004 The host is installed with Adobe Flash Player before 11.7.700.272 or 11.8.x through 12.0.x before 12.0.0.77 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unspecified vectors. Successful exploitation allows attackers to read the clipboa ... oval:org.secpod.oval:def:17003 The host is installed with Adobe Flash Player before 11.7.700.272 or 11.8.x through 12.0.x before 12.0.0.77 and is prone to same origin policy bypass vulnerability. A flaw is present in the application, which fails to handle certain unspecified vectors. Successful exploitation allows attackers to by ... oval:org.secpod.oval:def:18053 The host is installed with Adobe Flash Player before 11.2.202.346 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to read the clipboard. oval:org.secpod.oval:def:18052 The host is installed with Adobe Flash Player before 11.2.202.346 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to read the clipboard. oval:org.secpod.oval:def:18051 The host is installed with Adobe Flash Player before 11.2.202.346 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to bypass the same origin policy. oval:org.secpod.oval:def:18050 The host is installed with Adobe Flash Player before 11.2.202.346 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to bypass the same origin policy. oval:org.secpod.oval:def:18071 The host is missing a security update according to Adobe advisory, APSB14-08. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle a unspecified vectors. Successful exploitation could allow attackers to read the clipboard or bypass th ... oval:org.secpod.oval:def:18070 The host is missing a security update according to Adobe advisory, APSB14-08. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fail to handle a unspecified vectors. Successful exploitation could allow attackers to read the clipboard or bypass th ... oval:org.secpod.oval:def:43825 The host is missing a critical security update according to Adobe advisory, APSB18-03. The update is required to fix multiple use-after-free vulnerabilities. The flaws are present in the application, which fail to handle unspecified vectors. Successful exploitation could allow an attacker to perform ... oval:org.secpod.oval:def:43807 The host is installed with Adobe Flash Player 28.0.0.137 and earlier versions and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to take control of the affected system. oval:org.secpod.oval:def:43806 The host is installed with Adobe Flash Player 28.0.0.137 or earlier and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an attacker to take control of the affected system. oval:org.secpod.oval:def:43828 The host is installed with Adobe Flash Player 28.0.0.137 and earlier versions and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a quality of service functionality issue. Successful exploitation allows an attacker to perform arbitrary code ex ... oval:org.secpod.oval:def:43827 The host is installed with Adobe Flash Player 28.0.0.137 or earlier and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a quality of service functionality issue. Successful exploitation allows an attacker to perform arbitrary code execution. oval:org.secpod.oval:def:43826 The host is missing a critical security update according to Adobe advisory, APSB18-03. The update is required to fix multiple use-after-free vulnerabilities. The flaws are present in the application, which fail to handle unspecified vectors. Successful exploitation could allow an attacker to perform ... oval:org.secpod.oval:def:43808 The host is installed with Adobe Flash Player 28.0.0.137 or earlier and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to take control of the affected system. oval:org.secpod.oval:def:17056 The host is installed with Adobe Flash Player before 11.7.700.272 or 11.8.x through 12.0.x before 12.0.0.77 and is prone to same origin policy bypass vulnerability. A flaw is present in the application, which fails to handle certain unspecified vectors. Successful exploitation allows attackers to by ... oval:org.secpod.oval:def:17057 The host is installed with Adobe Flash Player before 11.7.700.272 or 11.8.x through 12.0.x before 12.0.0.77 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unspecified vectors. Successful exploitation allows attackers to read the clipboa ... oval:org.secpod.oval:def:17058 The host is installed with Adobe Flash Player before 11.7.700.272 or 11.8.x through 12.0.x before 12.0.0.77 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle certain unspecified vectors. Successful exploitation allows attackers to bypass the Sa ... |