The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a stack corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to an security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to an security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Adobe Flash Player before 11.2.202.632 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.