The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass the same origin policy.
The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player 12.0.0.77 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to execute arbitrary code and bypass a sandbox protection mechanism.
The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to corrupt memory or crash the service.
The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to validate user supplied input. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to remote code execution vulnerability. A flaw is present in the IML32 component, which fails to validate user supplied input. Successful exploitation could allow attackers to execute arbitrary code or crash the service.
The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.