All the vulnerabilites related to adobe - shockwave_player
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2114, CVE-2011-2124, CVE-2011-2127 y CVE-2011-2128. \r\n\r\n" } ], "id": "CVE-2011-2117", "lastModified": "2024-11-21T01:27:37.603", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.370", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie." }, { "lang": "es", "value": "Error en entero de signo en Adobe Shockwave Player anterior a v11.5.8.612 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario mediante un valor de longitud asociados con el trozo TSAC en una pel\u00edcula Director." } ], "id": "CVE-2010-2875", "lastModified": "2024-11-21T01:17:32.763", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.153", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00faffer en memoria din\u00e1mica en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-0758", "lastModified": "2024-11-21T01:35:40.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:01.980", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-11-05 21:00
Modified
2024-11-21 01:20
Severity ?
Summary
Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Una vulnerabilidad de uso de memoria previamente liberada en un componente de compatibilidad no especificado en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes remotos asistidos por el usuario ejecutar c\u00f3digo arbitrario por medio de un sitio web especialmente dise\u00f1ado, relacionado con la ventana Configuraci\u00f3n de Shockwave y una biblioteca descargada. NOTA: algunos de estos datos se obtienen de la informaci\u00f3n de terceros." } ], "id": "CVE-2010-4092", "lastModified": "2024-11-21T01:20:13.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-11-05T21:00:01.437", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/68982" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42112" }, { "source": "psirt@adobe.com", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/44617" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/68982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/44617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7101", "lastModified": "2024-11-21T04:47:33.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.470", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player v11.5.9.620, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-4307", "lastModified": "2024-11-21T01:20:39.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46339" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2024-11-21 01:03
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.5.0.595 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBD5E4-ED8C-4CCB-B71F-96F1B3B8CF20", "versionEndIncluding": "11.5.0.596", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Adobe Shockwave Player anterior a v11.5.0.600 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de contenido Shockwave Player 10 manipulado." } ], "id": "CVE-2009-1860", "lastModified": "2024-11-21T01:03:33.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-06-25T01:30:01.703", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35544" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35469" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022440" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2010-4309." } ], "id": "CVE-2010-4308", "lastModified": "2024-11-21T01:20:39.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:00.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047." }, { "lang": "es", "value": "\r\nAdobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2044, CVE-2012-2046 y CVE-2012-2047.\r\n" } ], "id": "CVE-2012-2045", "lastModified": "2024-11-21T01:38:22.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.803", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:11
Severity ?
Summary
Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:director:*:*:*:*:*:*:*:*", "matchCriteriaId": "58C4FCAB-2330-4C95-A969-D2AEBDFA7186", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation." }, { "lang": "es", "value": "Error de presencia de signo entero en dirapi.dll en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 y Adobe Director en versiones anteriores a la 11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado que dispara una operaci\u00f3n de lectura inv\u00e1lida." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-0128", "lastModified": "2024-11-21T01:11:35.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T17:30:01.780", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." } ], "id": "CVE-2012-0764", "lastModified": "2024-11-21T01:35:40.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.370", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79244" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/52004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52004" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-12 04:50
Modified
2024-11-21 02:02
Severity ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4B100C-6C43-4BEF-AD9C-680C7764A41E", "versionEndIncluding": "12.0.7.148", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0500." } ], "id": "CVE-2014-0501", "lastModified": "2024-11-21T02:02:16.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-12T04:50:41.343", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/103158" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/56740" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/65493" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/103158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-13 21:55
Modified
2024-11-21 01:47
Severity ?
Summary
Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player antes v 12.0.0.112 permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0635", "lastModified": "2024-11-21T01:47:54.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-13T21:55:06.697", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-10-28 18:59
Modified
2024-11-21 02:37
Severity ?
Summary
Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "175F749A-2D90-4049-B60B-2888F7041EF3", "versionEndIncluding": "12.2.0.162", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a 12.2.1.171 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-7649", "lastModified": "2024-11-21T02:37:08.777", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-28T18:59:06.250", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1033990" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027\r\n", "id": "CVE-2010-1289", "lastModified": "2024-11-21T01:14:03.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.627", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40087" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0762", "lastModified": "2024-11-21T01:35:40.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.260", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79242" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/52002" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0761", "lastModified": "2024-11-21T01:35:40.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.213", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79241" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/52001" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-21 19:30
Modified
2024-11-21 01:08
Severity ?
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86E4A33-61AB-4415-AE62-2CDB2A677335", "versionEndIncluding": "11.5.2.602", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption." }, { "lang": "es", "value": "M\u00faltiples desbordamiento de b\u00fafer basados en entero en Adobe Shockwave Player en versiones anteriores a la 11.5.6.606 permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante (1) un tipo de bloque no especificado en un fichero Shockwave, que genera un desbordamiento de b\u00fafer basado en pila; y pueden permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante (2) un bloque 3D no especificado en un fichero Shockwave que genera una corrupci\u00f3n de memoria; o (3) un modelo 3D manipulado en un fichero Shockwave que genera una corrupci\u00f3n de la pila." } ], "id": "CVE-2009-4003", "lastModified": "2024-11-21T01:08:42.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-01-21T19:30:00.820", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1023481" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/37872" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612 no parsea adecuadamente archivos .dir, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posibilita ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos mal formados que contienen un valor no v\u00e1lido, como se demostr\u00f3 con el valor de la posici\u00f3n 0x320D de ciertos archivos." } ], "id": "CVE-2010-2868", "lastModified": "2024-11-21T01:17:31.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.857", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-20 17:29
Modified
2024-11-21 03:24
Severity ?
Summary
Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A4839D-5A9B-4E5E-B253-050099B95EA1", "versionEndIncluding": "12.2.8.198", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Adobe Shockwave versiones 12.2.8.198 y anteriores, tienen una vulnerabilidad explotable de corrupci\u00f3n de memoria. Una explotaci\u00f3n exitosa podr\u00eda llevar a la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2017-3086", "lastModified": "2024-11-21T03:24:48.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-20T17:29:00.440", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99019" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1038656" }, { "source": "psirt@adobe.com", "url": "https://fortiguard.com/zeroday/FG-VD-16-036" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://fortiguard.com/zeroday/FG-VD-16-036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7100", "lastModified": "2024-11-21T04:47:33.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.423", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:11
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante bloques Shockwave 3D FFFFFF45h manipulados en un fichero Shockwave." } ], "id": "CVE-2010-0127", "lastModified": "2024-11-21T01:11:35.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.717", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-17/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-17/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el componente Shockwave3DAsset en Adobe Shockwave Player anterior a v11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2113", "lastModified": "2024-11-21T01:27:37.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.230", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Iml32.dll en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2419", "lastModified": "2024-11-21T01:28:14.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.520", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:14
Severity ?
Summary
The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." }, { "lang": "es", "value": "La validaci\u00f3n de los paquetes de pami RIFF en Adobe Shockwave Player anterior a v11.5.7.609 no valida un valor determinado desde un fichero antes de realizar los c\u00e1lculos del puntero al fichero, el cu\u00e1l permite a atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n del servicio (corrupci\u00f3n de memoria) a trav\u00e9s de la manipulaci\u00f3n del fichero .dir (conocido como Director)" } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\n\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1292", "lastModified": "2024-11-21T01:14:03.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T17:30:02.157", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." }, { "lang": "es", "value": "dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, y CVE-2010-4088." } ], "id": "CVE-2010-4084", "lastModified": "2024-11-21T01:20:12.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.277", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:24
Severity ?
Summary
Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a "faulty allocation" and memory corruption.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a \"faulty allocation\" and memory corruption." }, { "lang": "es", "value": "Un desbordamiento de enteros en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una pel\u00edcula Director con un gran valor de conteo en el registro de activos 3D tipo 0xFFFFFF45, que desencadena un \"faulty allocation\" y la corrupci\u00f3n de memoria." } ], "id": "CVE-2011-0557", "lastModified": "2024-11-21T01:24:17.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.347", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46330" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089." }, { "lang": "es", "value": "La biblioteca IML32.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo .dir con un registro mmap especialmente dise\u00f1ado que contiene una longitud no v\u00e1lida de una entrada VSWV, una vulnerabilidad diferente de CVE-2010-4089." } ], "id": "CVE-2010-4087", "lastModified": "2024-11-21T01:20:12.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.403", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088." }, { "lang": "es", "value": "La biblioteca dirapi.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo multimedia Director (.dir) especialmente dise\u00f1ado con un tama\u00f1o de elemento no v\u00e1lido, una vulnerabilidad diferente de CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085 y CVE-2010-4088." } ], "id": "CVE-2010-4086", "lastModified": "2024-11-21T01:20:12.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.373", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 23:59
Modified
2024-11-21 02:32
Severity ?
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC1082-6D2C-42F7-8C85-E28F7DBE2333", "versionEndIncluding": "12.1.8.158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120." }, { "lang": "es", "value": "Versiones de Adobe Shockwave Player anteriores a 12.1.9.159 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicios mediante la corrupci\u00f3n de memoria a trav\u00e9s de vectores no especificados, vulnerabilidad diferente de CVE-2015-5120" } ], "id": "CVE-2015-5121", "lastModified": "2024-11-21T02:32:24.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T23:59:04.097", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 23:59
Modified
2024-11-21 02:32
Severity ?
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC1082-6D2C-42F7-8C85-E28F7DBE2333", "versionEndIncluding": "12.1.8.158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121." }, { "lang": "es", "value": "versiones de Adobe Shockwave Player anteriores a la versi\u00f3n 12.1.9.159 permiten a atacantes la ejecuci\u00f3n de c\u00f3digo arbitrario o provocar denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante el uso de vectores no especificados, una vulnerabilidad distinta a CVE-2015-5121." } ], "id": "CVE-2015-5120", "lastModified": "2024-11-21T02:32:24.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T23:59:02.753", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1284", "lastModified": "2024-11-21T01:14:03.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.390", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40091" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2024-11-21 01:07
Severity ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Adobe Shockwave Player anerior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s un contenido Shockwave manipulado en una p\u00e1gina web. Relacionado con la \"vulnerabilidad de puntero inv\u00e1lido. Cuesti\u00f3n distinta de CVE-2009-3464. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3465", "lastModified": "2024-11-21T01:07:25.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.593", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-11 15:55
Modified
2024-11-21 01:57
Severity ?
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E387AD-12D0-4799-81CB-24F08E8D0D82", "versionEndIncluding": "12.0.6.147", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a la versi\u00f3n 12.0.7.148 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2013-5334." } ], "id": "CVE-2013-5333", "lastModified": "2024-11-21T01:57:20.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-11T15:55:07.120", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en IML32.dll de Adobe Shockwave Player con anterioridad a v11.6.0.626, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) o ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados.\r\n" } ], "id": "CVE-2011-2112", "lastModified": "2024-11-21T01:27:36.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.183", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2024-11-21 01:49
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player anterior a v12.0.2.122 que permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar." } ], "id": "CVE-2013-1383", "lastModified": "2024-11-21T01:49:28.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.430", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-13 21:55
Modified
2024-11-21 01:47
Severity ?
Summary
Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la pila en Adobe Shockwave Player hasta v12.0.0.112 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0636", "lastModified": "2024-11-21T01:47:54.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-13T21:55:06.760", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n con \u00e9xito conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7099", "lastModified": "2024-11-21T04:47:33.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.360", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.620 no valida de forma adecuada datos de entrada no especificada, lo que permite a atacantes a ejecutar c\u00f3digo de a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-4194", "lastModified": "2024-11-21T01:20:25.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.130", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46335" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida correctamente valores de offset (desplazamiento de pedazo) en el rcsL RIFF manipulado de (1) .DIR y (2) pel\u00edculas .DCR de Director, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada." } ], "id": "CVE-2010-2873", "lastModified": "2024-11-21T01:17:32.533", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.090", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/42682" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2024-11-21 01:49
Severity ?
Summary
Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v12.0.2.122 no impide el acceso a informaci\u00f3n de direcciones de memoria, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes para eludir el mecanismo de protecci\u00f3n ASLR a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1385", "lastModified": "2024-11-21T01:49:28.777", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.460", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 podr\u00eda permitir a atacantes ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1288", "lastModified": "2024-11-21T01:14:03.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.593", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446." }, { "lang": "es", "value": "El librer\u00eda DIRapi en Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2011-2446" } ], "id": "CVE-2011-2448", "lastModified": "2024-11-21T01:28:18.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.113", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:16
Severity ?
Summary
Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de enteros en el m\u00f3dulo dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-2589", "lastModified": "2024-11-21T01:16:57.747", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.537", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/46329" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-18 10:30
Modified
2024-11-21 01:06
Severity ?
Summary
Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el control ActiveX de la biblioteca SwDir.dll en Shockwave Player de Adobe versiones 11.5.1.601 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario por medio de un valor de propiedad PlayerVersion largo." } ], "id": "CVE-2009-3244", "lastModified": "2024-11-21T01:06:53.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-09-18T10:30:01.500", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023123" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/9682" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/9682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2024-11-21 01:07
Severity ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an \"invalid string length vulnerability.\" NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una p\u00e1gina web manipulada que provoca una corrupci\u00f3n de memoria. Relacionado con la \"vulnerabilidad de longitud de cadena inv\u00e1lida\". NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3466", "lastModified": "2024-11-21T01:07:25.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.627", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2044, CVE-2012-2045 y CVE-2012-2046.\r\n" } ], "id": "CVE-2012-2047", "lastModified": "2024-11-21T01:38:23.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.913", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:11
Severity ?
Summary
Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file." }, { "lang": "es", "value": "Desbordamiento de entero en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s dun fichero .dir (tambi\u00e9n conocido como Director) manipulado." } ], "id": "CVE-2010-0130", "lastModified": "2024-11-21T01:11:35.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.890", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40084" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-12 13:28
Modified
2024-11-21 01:53
Severity ?
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33992BA-E5D9-4134-AABC-0E7EEE6B619A", "versionEndIncluding": "12.0.3.133", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360." }, { "lang": "es", "value": "Adobe Shockwave Player anteriores a 12.0.4.144 permite a atacantes ejecutar c\u00f3digo a discrecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2013-3360." } ], "id": "CVE-2013-3359", "lastModified": "2024-11-21T01:53:28.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-12T13:28:24.557", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado, relacionado con (1) una dereferencia err\u00f3nea y (2) un cierto fichero Shock.dir." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1280", "lastModified": "2024-11-21T01:14:02.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.000", "references": [ { "source": "psirt@adobe.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "source": "psirt@adobe.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "source": "psirt@adobe.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2024-11-21 01:04
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that "was previously resolved in Shockwave Player 11.0.0.465."
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb09-08.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-08.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "849BA45D-66E6-495A-B81C-22B49B59212C", "versionEndIncluding": "11.0.0.456", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that \"was previously resolved in Shockwave Player 11.0.0.465.\"" }, { "lang": "es", "value": "Una vulnerabilidad no especificada en Adobe Shockwave Player anterior a la versi\u00f3n 11.0.0.465 permite que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de vectores desconocidos, una vulnerabilidad diferente de CVE-2009-1860, relacionada con un problema anterior que \"was previously resolved in Shockwave Player 11.0.0.465.\"" } ], "id": "CVE-2009-2186", "lastModified": "2024-11-21T01:04:19.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-06-25T01:30:01.813", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-2863", "lastModified": "2024-11-21T01:17:31.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-26T21:00:01.607", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:24
Severity ?
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556." }, { "lang": "es", "value": "El m\u00f3dulo Font Xtra.x32 en Adobe Shockwave Player anterior a 11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2011-0556." } ], "id": "CVE-2011-0569", "lastModified": "2024-11-21T01:24:19.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.567", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-19 19:29
Modified
2024-11-21 01:35
Severity ?
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E21770D-7354-44C4-AAA3-6BB1DB0B9392", "versionEndExcluding": "11.6.4.634", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.6.4.634 permite que los atacantes ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante vectores no especificados. Esta es una vulnerabilidad diferente de CVE-2012-0759." } ], "id": "CVE-2012-0771", "lastModified": "2024-11-21T01:35:41.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-19T19:29:00.313", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "nvd@nist.gov", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/encyclopedia/ips/31101/adobe-shockwave-player-multiple-memory-corruption" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119." }, { "lang": "es", "value": "En la biblioteca Dirapi.dll en Adobe Shockwave Player anterior a versi\u00f3n 11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de vectores no especificados relacionados con subestructuras rcsL, una vulnerabilidad diferente de CVE-2011-0317, CVE-2011-0318 , CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, y CVE-2011-2119." } ], "id": "CVE-2011-2122", "lastModified": "2024-11-21T01:27:38.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.543", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73029" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48297" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:24
Severity ?
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569." }, { "lang": "es", "value": "El m\u00f3dulo Font Xtra.x32 en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un fragmento PFR1 especialmente dise\u00f1ado que conlleva a una extensi\u00f3n de signo inesperada y una desreferencia de puntero no v\u00e1lida, una vulnerabilidad diferente de CVE-2011-0569." } ], "id": "CVE-2011-0556", "lastModified": "2024-11-21T01:24:17.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.300", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46328" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante un archivo multimedia .dir manipulado." } ], "id": "CVE-2011-2421", "lastModified": "2024-11-21T01:28:14.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-08-11T22:55:01.583", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with "duplicated references to the same KEY* chunk," a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." }, { "lang": "es", "value": "La biblioteca dirapi.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo .dir con \"duplicated references to the same KEY* chunk\", una vulnerabilidad diferente de CVE-2010-2581, CVE-2010-4084, CVE-2010-4085 y CVE-2010-4086." } ], "id": "CVE-2010-4088", "lastModified": "2024-11-21T01:20:13.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.433", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director con un fragmento IFWV con un campo de tama\u00f1o 0, que es usado en el c\u00e1lculo de un desplazamiento de archivo y causa que los datos no v\u00e1lidos sean usados como un contador de bucle, desencadenando un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria, una vulnerabilidad diferente de CVE-2010-2587 y CVE-2010-2588." } ], "id": "CVE-2010-4188", "lastModified": "2024-11-21T01:20:24.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.863", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46319" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:11
Severity ?
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de enteros en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado que dispara un error de indice de matriz." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-0129", "lastModified": "2024-11-21T01:11:35.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.827", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40082" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.620 permite a atacantes a ejecutar c\u00f3digo o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no espec\u00edficos, vulnerabilidad diferente a CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, y CVE-2010-4306." } ], "id": "CVE-2010-4191", "lastModified": "2024-11-21T01:20:24.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.973", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46325" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida correctamente un valor de desplazamiento en el fragmento pami RIFF en una pel\u00edcula Director, el cual puede permitir a atacantes remotos producir una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario mediante una pel\u00edcula manipulada" } ], "id": "CVE-2010-2872", "lastModified": "2024-11-21T01:17:32.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.060", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2420", "lastModified": "2024-11-21T01:28:14.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.553", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2030, CVE-2012-2031, CVE-2012-2032 y CVE-2012-2033." } ], "id": "CVE-2012-2029", "lastModified": "2024-11-21T01:38:19.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.243", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:19
Severity ?
Summary
Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en dirapi.dll de Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-3655", "lastModified": "2024-11-21T01:19:19.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.107", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-20 12:02
Modified
2024-11-21 01:45
Severity ?
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra." }, { "lang": "es", "value": "Adobe Shockwave Player hasta v11.6.8.638 permite a atacantes remotos provocar la instalaci\u00f3n de Xtras firmadas a trav\u00e9s de una pel\u00edcula Shockwave que contiene una direcci\u00f3n URL Xtra, como lo demuestra una URL para un Xtra anticuado." } ], "id": "CVE-2012-6271", "lastModified": "2024-11-21T01:45:57.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-12-20T12:02:20.013", "references": [ { "source": "cret@cert.org", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/519137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/519137" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "El m\u00f3dulo TextXtra en Adobe Shockwave Player anterior a v11.5.9.620 no valida correctamente la entrada de datos no especificados, que permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2010-4195", "lastModified": "2024-11-21T01:20:25.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.177", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46336" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2447", "lastModified": "2024-11-21T01:28:18.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.083", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "El m\u00f3dulo Shockwave 3d Asset de Adobe Shockwave Player en versiones anteriores a la 11.5.9.620 no valida apropiadamente datos de entrada sin especificar, lo que permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2010-4196", "lastModified": "2024-11-21T01:20:25.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.237", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46338" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0757", "lastModified": "2024-11-21T01:35:40.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:01.933", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-11 15:55
Modified
2024-11-21 01:57
Severity ?
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E387AD-12D0-4799-81CB-24F08E8D0D82", "versionEndIncluding": "12.0.6.147", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a la versi\u00f3n 12.0.7.148 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2013-5333." } ], "id": "CVE-2013-5334", "lastModified": "2024-11-21T01:57:20.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-11T15:55:07.167", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:23
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Vulnerabilidades distintas a CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, y CVE-2011-2122." } ], "id": "CVE-2011-0318", "lastModified": "2024-11-21T01:23:44.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, CVE-2012-2032 y CVE-2012-2033." } ], "id": "CVE-2012-2030", "lastModified": "2024-11-21T01:38:19.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.277", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448." }, { "lang": "es", "value": "La librer\u00eda DIRapi en Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2011-2448." } ], "id": "CVE-2011-2446", "lastModified": "2024-11-21T01:28:17.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.037", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.6.4.634 permite que los atacantes ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante vectores no especificados. Esta es una vulnerabilidad diferente de CVE-2012-0771." } ], "id": "CVE-2012-0759", "lastModified": "2024-11-21T01:35:40.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.040", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "msvcr90.dll en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2423", "lastModified": "2024-11-21T01:28:14.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.647", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/74429" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/74429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en el asignador del m\u00f3dulo TextXtra.x32 de Adobe Shockwave Player anterior a v11.5.8.612 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n en la pila de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n mediante (1) elemento count -contar- o (2) elemento size value -valor de tama\u00f1o- manipulados en un fichero." } ], "id": "CVE-2010-2879", "lastModified": "2024-11-21T01:17:33.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.310", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an "input validation vulnerability."
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an \"input validation vulnerability.\"" }, { "lang": "es", "value": "El componente FLV ASSET Xtra en Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos, relacionada con una \"vulnerabilidad de validaci\u00f3n de entrada\"." } ], "id": "CVE-2011-2118", "lastModified": "2024-11-21T01:27:37.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.400", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2010-4308." } ], "id": "CVE-2010-4309", "lastModified": "2024-11-21T01:20:39.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:00.817", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:13
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 no procesa adecuadamente las entradas de activos, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero Shockwave manipulado." } ], "id": "CVE-2010-0986", "lastModified": "2024-11-21T01:13:21.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.920", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40086" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-20 12:02
Modified
2024-11-21 01:45
Severity ?
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a "downgrading" attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a \"downgrading\" attack." }, { "lang": "es", "value": "Adobe Shockwave Player hasta v11.6.8.638 permite a atacantes remotos provocar la instalaci\u00f3n de una caracter\u00edstica de compatibilidad de Shockwave Player v10.4.0.025 a trav\u00e9s de un documento HTML modificado que referencia al contenido Sockwave con algunos par\u00e1metros de compatibilidad, relacionado con un ataque de \"downgrading\"" } ], "id": "CVE-2012-6270", "lastModified": "2024-11-21T01:45:57.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-12-20T12:02:19.980", "references": [ { "source": "cret@cert.org", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/546769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/546769" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2024-11-21 01:49
Severity ?
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v12.0.2.122 permite a atacantes ejecutar c\u00f3digo arbitrario o causar denegaci\u00f3n de servicios (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2013-1386." } ], "id": "CVE-2013-1384", "lastModified": "2024-11-21T01:49:28.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.447", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2109", "lastModified": "2024-11-21T01:27:36.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.087", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73033" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, y CVE-2012-2032." } ], "id": "CVE-2012-2033", "lastModified": "2024-11-21T01:38:20.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.417", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2024-11-21 01:49
Severity ?
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v12.0.2.122 permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, Se trata de una vulnerabilidad diferente a CVE-2013-1384." } ], "id": "CVE-2013-1386", "lastModified": "2024-11-21T01:49:28.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.477", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:23
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll de Adobe Shockwave Player en versiones anteriores a 11.6.0.626 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una enegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad distinta a CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119 y CVE-2011-2122." } ], "id": "CVE-2011-0317", "lastModified": "2024-11-21T01:23:44.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.230", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing "duplicated LCSM entries in mmap record," a different vulnerability than CVE-2010-4087.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing \"duplicated LCSM entries in mmap record,\" a different vulnerability than CVE-2010-4087." }, { "lang": "es", "value": "La biblioteca IML32.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo .dir que contiene \"duplicated LCSM entries in mmap record\", una vulnerabilidad diferente de CVE-2010-4087." } ], "id": "CVE-2010-4089", "lastModified": "2024-11-21T01:20:13.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.467", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.6.636 permite a atacantes ejecutar c\u00f3digo arbitrario y causar una denegaci\u00f3n de servicio mediante vectores no especificados, una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, y CVE-2012-2047." } ], "id": "CVE-2012-2044", "lastModified": "2024-11-21T01:38:22.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.757", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-14 10:55
Modified
2024-11-21 02:02
Severity ?
Summary
Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 | |
adobe | shockwave_player | 12.0.7.148 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2367BAB-E085-46F7-B8DE-CF3B3656BAB5", "versionEndIncluding": "12.0.9.149", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.7.148:*:*:*:*:*:*:*", "matchCriteriaId": "4F284BF7-8E14-4608-B515-2B5D4F55BA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.1.0.150 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-0505", "lastModified": "2024-11-21T02:02:16.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-14T10:55:05.600", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida adecuadamente los valores asociados con el c\u00e1lculo del tama\u00f1o de b\u00fafer para un registro 0xFFFFFFF8 en archivos (1) .dir o (2) .dcr de una pel\u00edcula de Director, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada.\r\n" } ], "id": "CVE-2010-2876", "lastModified": "2024-11-21T01:17:32.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.187", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1290", "lastModified": "2024-11-21T01:14:03.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.670", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612 no valida adecuadamente los archivos .dir, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo mal formado que contiene un valor no v\u00e1lido , como se ha demostrado con un valor en la posici\u00f3n 0x24C0 de un archivo determinado." } ], "id": "CVE-2010-2881", "lastModified": "2024-11-21T01:17:33.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.387", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a "design flaw."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a \"design flaw.\"" }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados, relacionados con un \"error de dise\u00f1o\"." } ], "id": "CVE-2011-2108", "lastModified": "2024-11-21T01:27:36.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.057", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73012" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48311" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-09 00:59
Modified
2024-11-21 02:35
Severity ?
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E66A61F-593B-4496-B19A-100215C0648E", "versionEndIncluding": "12.1.9.160", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681." }, { "lang": "es", "value": "Vulnerabilidad en Adobe Shockwave Player en versiones anteriores a 12.2.0.162, permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-6681." } ], "id": "CVE-2015-6680", "lastModified": "2024-11-21T02:35:25.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-09T00:59:54.160", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "psirt@adobe.com", "url": "https://security.gentoo.org/glsa/201509-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-07" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, y CVE-2012-2032." } ], "id": "CVE-2012-2032", "lastModified": "2024-11-21T01:38:20.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.387", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de entero en Adobe Shockwave Player anterior a 11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2121", "lastModified": "2024-11-21T01:27:38.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.510", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73034" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:16
Severity ?
Summary
An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code." }, { "lang": "es", "value": "Una funci\u00f3n no especificada en TextXtra.x32 en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, no reasigna apropiadamente un b\u00fafer al procesar un fragmento DEMX en un archivo Director, lo que permite a los atacantes remotos activar un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria y ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2010-2582", "lastModified": "2024-11-21T01:16:56.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:01.590", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-114/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-114/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Vulnerabilidad distinta de CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335 y CVE-2011-2122." } ], "id": "CVE-2011-2119", "lastModified": "2024-11-21T01:27:37.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.433", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-21 19:30
Modified
2024-11-21 01:08
Severity ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86E4A33-61AB-4415-AE62-2CDB2A677335", "versionEndIncluding": "11.5.2.602", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en Adobe Shockwave Player anterior a v11.5.6.606, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un modelo manipulado en 3D en un archivo Shockwave" } ], "id": "CVE-2009-4002", "lastModified": "2024-11-21T01:08:42.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-01-21T19:30:00.773", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1023481" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/37870" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7103", "lastModified": "2024-11-21T04:47:34.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.550", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 2114, CVE -2011- 2117, CVE -2011- 2124, CVE- 2011 y 2127." } ], "id": "CVE-2011-2128", "lastModified": "2024-11-21T01:27:38.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.760", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73027" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48290" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:16
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll de Adobe Shockwave Player en versiones anteriores a la 11.5.9.620 permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar. Es una vunerabilidad diferente a la CVE-2010-2587 y CVE-2010-4188." } ], "id": "CVE-2010-2588", "lastModified": "2024-11-21T01:16:57.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.393", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/46318" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-12 04:50
Modified
2024-11-21 02:02
Severity ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4B100C-6C43-4BEF-AD9C-680C7764A41E", "versionEndIncluding": "12.0.7.148", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0501." } ], "id": "CVE-2014-0500", "lastModified": "2024-11-21T02:02:15.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-12T04:50:41.313", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/103157" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/56740" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/65490" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/103157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:14
Severity ?
Summary
iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." }, { "lang": "es", "value": "iml32.dll en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 no valida un cierto valor de un archivo antes de usarlo en los c\u00e1lculos de punteros de ficheros, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1281", "lastModified": "2024-11-21T01:14:02.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.030", "references": [ { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2115 y CVE-2011-2116.\r\n" } ], "id": "CVE-2011-2111", "lastModified": "2024-11-21T01:27:36.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.150", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." } ], "id": "CVE-2012-0766", "lastModified": "2024-11-21T01:35:41.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.447", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79245" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.7.609 no parsea adcuadamente objetos 3D en ficheros .dir (conocido como Director), los cuales permiten a atacantes remotos ejecutar c\u00f3digo aleatorio o causar una denegaci\u00f3n del servicio (corrupci\u00f3n de la memoria din\u00e1mica -heap-) a trav\u00e9s de la modificaci\u00f3n de un campo del registro 0xFFFFFF49." } ], "id": "CVE-2010-1283", "lastModified": "2024-11-21T01:14:02.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.127", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2024-11-21 01:07
Severity ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Adobe Shockwave Player anerior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s un contenido Shockwave manipulado en una p\u00e1gina web. Relacionado con la \"vulnerabilidad de puntero inv\u00e1lido. Cuesti\u00f3n distinta de CVE-2009-3465. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3464", "lastModified": "2024-11-21T01:07:25.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.577", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:24
Severity ?
Summary
The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "El m\u00f3dulo TextXtra.x32 de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) por medio de un archivo Director con un fragmento DEMX RIFF dise\u00f1ado que desencadena una asignaci\u00f3n incorrecta del b\u00fafer, una vulnerabilidad diferente de CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192 y CVE-2010-4306." } ], "id": "CVE-2011-0555", "lastModified": "2024-11-21T01:24:17.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.270", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46327" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:13
Severity ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante fuentes manipuladas embebidas en un fichero Shockwave." } ], "id": "CVE-2010-0987", "lastModified": "2024-11-21T01:13:21.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.953", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40093" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2024-11-21 01:42
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4173", "lastModified": "2024-11-21T01:42:19.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.487", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86538" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." } ], "id": "CVE-2010-4306", "lastModified": "2024-11-21T01:20:39.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46333" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116." }, { "lang": "es", "value": "En la biblioteca IML32.dll en Adobe Shockwave Player anterior a versi\u00f3n 11.6.0.626, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un fragmento tSAC especialmente dise\u00f1ado, lo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria, una vulnerabilidad diferente de CVE-2011 -2111 y CVE-2011-2116." } ], "id": "CVE-2011-2115", "lastModified": "2024-11-21T01:27:37.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.293", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1286", "lastModified": "2024-11-21T01:14:03.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.517", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2024-11-21 01:07
Severity ?
Summary
Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Error de indexaci\u00f3n de array en Adobe Shockwave Player anterior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un contenido Shockwave manipulado en un sitios web. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3463", "lastModified": "2024-11-21T01:07:25.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.500", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "El m\u00f3dulo TextXtra en Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados" } ], "id": "CVE-2011-2449", "lastModified": "2024-11-21T01:28:18.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.160", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0760", "lastModified": "2024-11-21T01:35:40.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.137", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088." }, { "lang": "es", "value": "dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, y CVE-2010-4088." } ], "id": "CVE-2010-4085", "lastModified": "2024-11-21T01:20:12.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.327", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-14 16:59
Modified
2024-11-21 03:24
Severity ?
Summary
Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D35B9AD-40AB-4819-9D86-8FC4FCF6E2A1", "versionEndIncluding": "12.2.7.197", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege." }, { "lang": "es", "value": "Adobe Shockwave versi\u00f3n 12.2.7.197 y versiones anteriores tienen una vulnerabilidad de carga de librer\u00eda insegura (secuestro de DLL). Una explotaci\u00f3n exitosa podr\u00eda conducir a escalada de privilegios." } ], "id": "CVE-2017-2983", "lastModified": "2024-11-21T03:24:35.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T16:59:00.163", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/96863" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1037993" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/96863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-4090", "lastModified": "2024-11-21T01:20:13.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.497", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-10 10:55
Modified
2024-11-21 01:53
Severity ?
Summary
Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDAB66DE-DE3E-448B-8159-B3686A084CCA", "versionEndIncluding": "12.0.2.122", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.3.133 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-3348", "lastModified": "2024-11-21T01:53:27.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-10T10:55:02.487", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1028758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028758" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an \"undocumented structure\" and the tSAC chunk in a Director movie." }, { "lang": "es", "value": "Error de signo en entero en el m\u00f3dulo DIRAPI en Adobe Shockwave Player anterior a v11.5.8.612, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un valor \"count\" asociado a una \"estructura no documentada\" y un trozo de tSAC en una pel\u00edcula Director." } ], "id": "CVE-2010-2866", "lastModified": "2024-11-21T01:17:31.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.780", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU) a trav\u00e9s de la manipulaci\u00f3n del tama\u00f1o de un fichero .dir (tambi\u00e9n conocido como Director)" } ], "id": "CVE-2010-1282", "lastModified": "2024-11-21T01:14:02.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.093", "references": [ { "source": "psirt@adobe.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "source": "psirt@adobe.com", "tags": [ "Not Applicable" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40088" }, { "source": "psirt@adobe.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612, no valida adecuadamente los archivos .dir, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo mal formado con un valor no v\u00e1lido, como se ha demostrado con un valor determinado en la posici\u00f3n 0x3712 de un archivo." } ], "id": "CVE-2010-2869", "lastModified": "2024-11-21T01:17:32.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.887", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:16
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." }, { "lang": "es", "value": "La biblioteca dirapi.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo Director que contiene un fragmento pamm especialmente dise\u00f1ado con un (1) tama\u00f1o y (2) n\u00famero de sub fragmentos no v\u00e1lidos, una vulnerabilidad diferente de CVE-2010-4084, CVE-2010-4085, CVE-2010-4086 y CVE-2010-4088." } ], "id": "CVE-2010-2581", "lastModified": "2024-11-21T01:16:56.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:01.560", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/secunia_research/2010-113/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2010-113/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds "seek" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds \"seek\" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.9.620 permite que los atacantes ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante una pel\u00edcula Director con un fragmento RIFF CSWV que provoca un c\u00e1lculo incorrecto de un desplazamiento para una subestructura, lo que provoca un \"seek\" fuera de l\u00edmites de la memoria din\u00e1mica (heap). Esta vulnerabilidad es diferente de CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192 y CVE-2010-4306." } ], "id": "CVE-2010-4190", "lastModified": "2024-11-21T01:20:24.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.940", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46324" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "DIRAPIX.dll en Adobe Shockwave Player anterior a v11.5.8.612 no valida de forma adecuada el tama\u00f1o de determinado fragmento en el fragmento nmap de una pel\u00edcula de Director, esto permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n en la pila de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada." } ], "id": "CVE-2010-2870", "lastModified": "2024-11-21T01:17:32.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.937", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-09-07 18:00
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Adobe Shockwave Player anterior a v11.5.8.612 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos que desencadenan una corrupci\u00f3n de memoria. NOTA: debido al conflicto de informaci\u00f3n y uso del mismo identificador CVE por el fabricante, ZDI y TippingPoint, no est\u00e1 claro si este problema est\u00e1 relacionado con el uso de un puntero sin inicializar, un c\u00e1lculo de desplazamiento de puntero incorrecto o ambos." } ], "id": "CVE-2010-2874", "lastModified": "2024-11-21T01:17:32.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-09-07T18:00:02.247", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612 no parsea adecuadamente archivos .dir, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos mal formados que contienen un valor no v\u00e1lido, como se demostr\u00f3 con el valor de la posici\u00f3n 0x24C6 de ciertos archivos." } ], "id": "CVE-2010-2864", "lastModified": "2024-11-21T01:17:31.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.653", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-12 13:28
Modified
2024-11-21 01:53
Severity ?
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33992BA-E5D9-4134-AABC-0E7EEE6B619A", "versionEndIncluding": "12.0.3.133", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359." }, { "lang": "es", "value": "Adobe Shockwave Player anteriores a 12.0.4.144 permite a atacantes ejecutar c\u00f3digo arbitrario o causar denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2013-3359." } ], "id": "CVE-2013-3360", "lastModified": "2024-11-21T01:53:28.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-12T13:28:24.563", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-14 01:46
Modified
2024-11-21 00:38
Severity ?
Summary
Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el control ActiveX SWCtl.SWCtl en Adobe Shockwave permite a atacantes remotos provocar denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento largo en el m\u00e9todo ShockwaveVersion." } ], "id": "CVE-2007-5941", "lastModified": "2024-11-21T00:38:59.973", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-14T01:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26388" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4613" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2024-11-21 01:42
Severity ?
Summary
Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Error de \u00edndice de matriz en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-4176", "lastModified": "2024-11-21T01:42:19.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.627", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86542" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2024-11-21 01:42
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4172", "lastModified": "2024-11-21T01:42:19.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.457", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86537" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida correctamente un valor de contador en una pel\u00edcula de Director, lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n en la pila de memoria) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de una pel\u00edcula manipulada, relacionado con IML32X.dll y DIRAPIX.dll." } ], "id": "CVE-2010-2877", "lastModified": "2024-11-21T01:17:32.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.233", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "DIRAPIX.dll en Adobe Shockwave Player anterior a v11.5.8.612 no valida adecuadamente los valores asociados al b\u00fafer de b\u00fasqueda de\r\n una pel\u00edcula de Director, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada.\r\n" } ], "id": "CVE-2010-2878", "lastModified": "2024-11-21T01:17:33.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.280", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file." }, { "lang": "es", "value": "DIRAPI.dll en dobe Shockwave Player anterior a v11.5.8.612 no parsea correctamente ficheros .dir, lo que puede dar lugar a que atacantes remotos generen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario mediante un fichero malformado conteniendo un valor no v\u00e1lido, como lo demuestra un valor en la posici\u00f3n 0x3812 de un determinado archivo." } ], "id": "CVE-2010-2882", "lastModified": "2024-11-21T01:17:33.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.420", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a va11.5.9.620 no valida correctamente la entrada de datos no especificados, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2010-4193", "lastModified": "2024-11-21T01:20:24.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.083", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46334" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:16
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2010-2588 y CVE-2010-4188." } ], "id": "CVE-2010-2587", "lastModified": "2024-11-21T01:16:57.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:01.880", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/46316" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306." }, { "lang": "es", "value": "Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director con un registro de tipo 0xFFFFFF88 de activos 3D especialmente dise\u00f1ados que desencadenan una asignaci\u00f3n de memoria incorrecta, una vulnerabilidad diferente de CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191 y CVE-2010-4306." } ], "id": "CVE-2010-4192", "lastModified": "2024-11-21T01:20:24.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.037", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46326" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "B\u00fafer Overflow en Adobe Shockwave Player en versiones anteriores a 11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2126", "lastModified": "2024-11-21T01:27:38.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.683", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73011" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48309" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "Un desbordamiento de enteros en el componente Shockwave 3D Asset (32 bits) en Adobe Shockwave Player anterior a versi\u00f3n 11.6.0.626, permite que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de un subregistro especialmente dise\u00f1ado en un fragmento DEMX, lo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria." } ], "id": "CVE-2011-2123", "lastModified": "2024-11-21T01:27:38.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.587", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2044, CVE-2012-2045 y CVE-2012-2047.\r\n" } ], "id": "CVE-2012-2046", "lastModified": "2024-11-21T01:38:22.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.867", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0763", "lastModified": "2024-11-21T01:35:40.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.307", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1287", "lastModified": "2024-11-21T01:14:03.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.563", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-09 00:59
Modified
2024-11-21 02:35
Severity ?
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1033486 | ||
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | Patch, Vendor Advisory | |
psirt@adobe.com | https://security.gentoo.org/glsa/201509-07 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033486 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-07 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E66A61F-593B-4496-B19A-100215C0648E", "versionEndIncluding": "12.1.9.160", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680." }, { "lang": "es", "value": "Vulnerabilidad en Adobe Shockwave Player en versiones anteriores a 12.2.0.162, permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-6680." } ], "id": "CVE-2015-6681", "lastModified": "2024-11-21T02:35:25.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-09T00:59:55.363", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201509-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file." }, { "lang": "es", "value": "DIRAPI.dll en Adobe Shockwave Player anterior a v11.5.8.612 no parsea adecuadamente archivos .dir, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo mal formado que contiene un valor no v\u00e1lido, como se demostr\u00f3 con un valor de la posici\u00f3n 0x47 de ciertos ficheros." } ], "id": "CVE-2010-2880", "lastModified": "2024-11-21T01:17:33.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.357", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Adobe Shockwave Player anterior a v11.5.8.612 permite a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos" } ], "id": "CVE-2010-2865", "lastModified": "2024-11-21T01:17:31.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-26T21:00:01.700", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un fragmento malformado en un archivo Director, una vulnerabilidad diferente a la CVE-2011-0555, CVE-2010-4093, CVE- 2010-4190, CVE-2010-4191, CVE-2010-4192 y CVE-2010-4306." } ], "id": "CVE-2010-4187", "lastModified": "2024-11-21T01:20:24.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.800", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46317" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 16:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo." } ], "id": "CVE-2019-7104", "lastModified": "2024-11-21T04:47:34.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T16:29:08.857", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 2111 y CVE- 2011 - 2115." } ], "id": "CVE-2011-2116", "lastModified": "2024-11-21T01:27:37.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.337", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:23
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player antes de v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 0317, CVE -2011- 0318, CVE -2011- 0319, CVE -2011- 0320, CVE -2011- 2119, CVE- 2011 y 2122." } ], "id": "CVE-2011-0335", "lastModified": "2024-11-21T01:23:46.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.400", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1291", "lastModified": "2024-11-21T01:14:03.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.703", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n con \u00e9xito conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7098", "lastModified": "2024-11-21T04:47:33.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.330", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2117, CVE-2011-2124, CVE-2011-2127 y CVE-2011-2128." } ], "id": "CVE-2011-2114", "lastModified": "2024-11-21T01:27:37.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.260", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset." }, { "lang": "es", "value": "El m\u00f3dulo IML32 de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director que contiene una imagen GIF con un valor de tama\u00f1o de la tabla de colores global especialmente dise\u00f1ado, que causa un desplazamiento de puntero fuera de rango." } ], "id": "CVE-2010-4189", "lastModified": "2024-11-21T01:20:24.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.910", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46320" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a "pointer offset vulnerability."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a \"pointer offset vulnerability.\"" }, { "lang": "es", "value": "DIRAPIX.dll en Adobe Shockwave Player anterior a v11.5.8.612 no maneja correctamente un determinado valor de retorno asociado con el fragmento rcsl en una pel\u00edcula Director, el cual puede permitir a un atacante remoto generar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria en el mont\u00f3n) o ejecutar c\u00f3digo arbitrario mediante una pel\u00edcula manipulada, relacionado con \"vulnerabilidad de puntero de desplazamiento.\"" } ], "id": "CVE-2010-2867", "lastModified": "2024-11-21T01:17:31.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.810", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-4175." } ], "id": "CVE-2012-5273", "lastModified": "2024-11-21T01:44:23.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.677", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86541" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/56187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56187" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de enteros en el componente CursorAsset x32 de Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2120", "lastModified": "2024-11-21T01:27:37.967", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.480", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2044, CVE-2012-2045, CVE-2012-2046 y CVE-2012-2047.\r\n" } ], "id": "CVE-2012-2043", "lastModified": "2024-11-21T01:38:22.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.727", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2024-11-21 01:20
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.620 permite a atacantes a ejecutar c\u00f3digo o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no espec\u00edficos, vulnerabilidad diferente a CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, y CVE-2010-4306." } ], "id": "CVE-2010-4093", "lastModified": "2024-11-21T01:20:13.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.707", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46321" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:23
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player antes de v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 0317, CVE -2011- 0318, CVE -2011- 0320, CVE -2011- 0335, CVE -2011- 2119, CVE- 2011 y 2122." } ], "id": "CVE-2011-0319", "lastModified": "2024-11-21T01:23:44.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2024-11-21 00:02
Severity ?
Summary
Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 10.1.0.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters." } ], "id": "CVE-2005-3525", "lastModified": "2024-11-21T00:02:06.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19009" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/481" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015673" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "source": "cve@mitre.org", "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23461" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16791" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:23
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, y CVE-2011-2122." } ], "id": "CVE-2011-0320", "lastModified": "2024-11-21T01:23:44.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.370", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2024-11-21 01:38
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, y CVE-2012-2032." } ], "id": "CVE-2012-2031", "lastModified": "2024-11-21T01:38:19.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.323", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2024-11-21 01:42
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4174", "lastModified": "2024-11-21T01:42:19.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.537", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86539" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2024-11-21 01:42
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4175", "lastModified": "2024-11-21T01:42:19.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.580", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86540" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:28
Severity ?
Summary
Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Textra.x32 en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2422", "lastModified": "2024-11-21T01:28:14.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.613", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "B\u00fafer overflow Dirapix.dll en Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2125", "lastModified": "2024-11-21T01:27:38.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.650", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73015" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48308" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie." }, { "lang": "es", "value": "Desbordamiento de entero en la funcionalidad 3D en Adobe Shockwave Player anterior a 11.5.8.612, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un tama\u00f1o con un valor manipulado en un registro 0xFFFFFF45 RIFF en una pel\u00edcula de Director." } ], "id": "CVE-2010-2871", "lastModified": "2024-11-21T01:17:32.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.013", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Vulnerabilidad distinta de CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, y CVE-2011-2128." } ], "id": "CVE-2011-2124", "lastModified": "2024-11-21T01:27:38.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.620", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73019" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48294" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-26 18:00
Modified
2024-11-21 01:19
Severity ?
Summary
The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "El m\u00f3dulo Director (biblioteca dirapi.dll) en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula de Director con un fragmento rcsL dise\u00f1ado que contiene un campo cuyo valor se utiliza como un desplazamiento de puntero, como se explot\u00f3 \u201cin the wild\u201d en octubre de 2010. NOTA: algunos de estos datos se obtienen de la informaci\u00f3n de terceros." } ], "id": "CVE-2010-3653", "lastModified": "2024-11-21T01:19:18.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-26T18:00:01.597", "references": [ { "source": "psirt@adobe.com", "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "source": "psirt@adobe.com", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "source": "psirt@adobe.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/44291" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024635" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2752" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/44291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, y CVE-2011-2128." } ], "id": "CVE-2011-2127", "lastModified": "2024-11-21T01:27:38.817", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.730", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73032" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48289" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7102", "lastModified": "2024-11-21T04:47:34.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.503", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-08 23:17
Modified
2024-11-21 00:37
Severity ?
Summary
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | 9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324." }, { "lang": "es", "value": "La extensi\u00f3n Adobe Macromedia Flash 9 permite a atacantes remotos provocar que la m\u00e1quina de una v\u00edctima establezca sesiones TCP con anfitriones arbitrarios mediante una pel\u00edcula Flash (SWF), relacionada con la falta de fijaci\u00f3n de un nombre de anfitri\u00f3n con una direcci\u00f3n IP \u00fanica despu\u00e9s de recibir un elemento permitir-acceso-desde (allow-access-from) en un documento XML de pol\u00edtica-de-dominio-cruzado (cross-domain-policy), y la disponibilidad de una clase Socket Flash que no utiliza las fijaciones DNS del navegador, tambi\u00e9n conocidos como ataques de revinculaci\u00f3n DNS, un problema diferente de CVE-2002-1467 Y CVE-2007-4324." } ], "id": "CVE-2007-5275", "lastModified": "2024-11-21T00:37:32.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-08T23:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28157" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28161" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28213" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28570" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29763" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29865" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30430" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30507" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019116" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26930" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-2125
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/73015 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/48308 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68049 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "73015", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73015" }, { "name": "48308", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48308" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "shockwave-player-dirapix-bo(68049)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "73015", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73015" }, { "name": "48308", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48308" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "shockwave-player-dirapix-bo(68049)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "73015", "refsource": "OSVDB", "url": "http://osvdb.org/73015" }, { "name": "48308", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48308" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "shockwave-player-dirapix-bo(68049)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2125", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1383
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-16 20:38
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-12.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1383", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-16T20:38:02.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-5334
Vulnerability from cvelistv5
Published
2013-12-11 15:00
Modified
2024-08-06 17:06
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333.
References
▼ | URL | Tags |
---|---|---|
http://helpx.adobe.com/security/products/shockwave/apsb13-29.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:06:52.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-11T12:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-5334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-5334", "datePublished": "2013-12-11T15:00:00", "dateReserved": "2013-08-20T00:00:00", "dateUpdated": "2024-08-06T17:06:52.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1288
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "oval:org.mitre.oval:def:7543", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "oval:org.mitre.oval:def:7543", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "oval:org.mitre.oval:def:7543", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1288", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4187
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46317 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46317", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46317" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110208 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46317", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46317" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110208 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46317", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46317" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110208 Adobe Shockwave Player Memory Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4187", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1282
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/40088 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/511254/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388 | vdb-entry, signature, x_refsource_OVAL | |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html | mailing-list, x_refsource_FULLDISC | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40088", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40088" }, { "name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7388", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "40088", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40088" }, { "name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7388", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1282", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40088", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40088" }, { "name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7388", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html", "refsource": "MISC", "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1282", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0569
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/516335/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://dvlabs.tippingpoint.com/advisory/TPTI-11-05 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65260 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110209 TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "name": "adobe-fontxtra-code-execution(65260)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110209 TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "name": "adobe-fontxtra-code-execution(65260)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110209 TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "name": "adobe-fontxtra-code-execution(65260)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0569", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4306
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/46333 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46333", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46333" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46333", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46333" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46333", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46333" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4306", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3655
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:18
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12077", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12077", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3655", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12077", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-3655", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:53.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2043
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-17 01:06
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2043", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-17T01:06:03.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2447
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-27.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026288 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2447", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2864
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/513334/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11913", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11913", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11913", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2864", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2031
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49086 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1027037 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/53420 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-13.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75460 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "asp-memory-code-exec(75460)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "asp-memory-code-exec(75460)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "asp-memory-code-exec(75460)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2031", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2589
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 02:39
Severity ?
EPSS score ?
Summary
Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65245 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/46329 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "shockwave-player-director-code-exec(65245)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "name": "46329", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46329" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "shockwave-player-director-code-exec(65245)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "name": "46329", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46329" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2589", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "shockwave-player-director-code-exec(65245)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "name": "46329", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46329" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2589", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7103
Vulnerability from cvelistv5
Published
2019-05-23 16:26
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:26:31", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7103", "datePublished": "2019-05-23T16:26:31", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1284
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/40091 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6638", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "name": "40091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40091" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6638", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "name": "40091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40091" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6638", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "name": "40091", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40091" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1284", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2870
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://dvlabs.tippingpoint.com/advisory/TPTI-10-15 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/513303/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "name": "20100824 TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:11554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "name": "20100824 TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11554", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "name": "20100824 TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2870", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7101
Vulnerability from cvelistv5
Published
2019-05-23 16:28
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:28:57", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7101", "datePublished": "2019-05-23T16:28:57", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2128
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/48290 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68052 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://osvdb.org/73027 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48290", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48290" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-memory-ce(68052)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73027", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "48290", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48290" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-memory-ce(68052)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73027", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73027" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48290", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48290" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-memory-ce(68052)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73027", "refsource": "OSVDB", "url": "http://osvdb.org/73027" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2128", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2581
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 02:39
Severity ?
EPSS score ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/514559/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185 | vdb-entry, signature, x_refsource_OVAL | |
http://secunia.com/secunia_research/2010-113/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"pamm\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12185", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-113/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"pamm\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12185", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-113/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2581", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"pamm\" Chunk Parsing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12185", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "name": "http://secunia.com/secunia_research/2010-113/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-113/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2581", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2865
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:11725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11725", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2865", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2880
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/513331/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "oval:org.mitre.oval:def:12012", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "oval:org.mitre.oval:def:12012", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "oval:org.mitre.oval:def:12012", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2880", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3464
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/36905 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54119 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb09-16.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2009/3134 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1023123 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "shockwave-pointer-code-execution(54119)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6394", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "shockwave-pointer-code-execution(54119)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6394", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "shockwave-pointer-code-execution(54119)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6394", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3464", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2877
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://dvlabs.tippingpoint.com/advisory/TPTI-10-09 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/513296/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "name": "20100824 TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11895", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "name": "20100824 TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11895", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "name": "20100824 TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11895", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2877", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0757
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-16 20:12
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0757", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-16T20:12:26.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3244
Vulnerability from cvelistv5
Published
2009-09-18 10:00
Modified
2024-08-07 06:22
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/36905 | vdb-entry, x_refsource_BID | |
http://www.exploit-db.com/exploits/9682 | exploit, x_refsource_EXPLOIT-DB | |
http://www.adobe.com/support/security/bulletins/apsb09-16.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/3134 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530 | vdb-entry, signature, x_refsource_OVAL | |
http://securitytracker.com/id?1023123 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:22:24.010Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "9682", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/9682" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "oval:org.mitre.oval:def:6530", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "9682", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/9682" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "oval:org.mitre.oval:def:6530", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3244", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "9682", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/9682" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "oval:org.mitre.oval:def:6530", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3244", "datePublished": "2009-09-18T10:00:00", "dateReserved": "2009-09-18T00:00:00", "dateUpdated": "2024-08-07T06:22:24.010Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0505
Vulnerability from cvelistv5
Published
2014-03-14 10:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://helpx.adobe.com/security/products/shockwave/apsb14-10.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-14T05:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0505", "datePublished": "2014-03-14T10:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1286
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7269", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7269", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7269", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1286", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2420
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.747Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2420", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.747Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2115
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116.
References
▼ | URL | Tags |
---|---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110614 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-07-20T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20110614 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110614 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2115", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0636
Vulnerability from cvelistv5
Published
2013-02-13 21:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-06.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA13-043A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-04T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0636", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-06.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0636", "datePublished": "2013-02-13T21:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2032
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49086 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75461 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1027037 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/53420 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-13.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-file-code-execution(75461)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-file-code-execution(75461)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "asp-file-code-execution(75461)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2032", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1289
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652 | vdb-entry, signature, x_refsource_OVAL | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/40087 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:6652", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "40087", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40087" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:6652", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "40087", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40087" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1289", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:6652", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "40087", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40087" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1289", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2045
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-17 01:16
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2045", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-17T01:16:22.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0555
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/516333/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65257 | vdb-entry, x_refsource_XF | |
http://dvlabs.tippingpoint.com/advisory/TPTI-11-02 | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/46327 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110209 TPTI-11-02: Adobe Shockwave TextXtra Invalid Seek Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "name": "shockwave-memory-code-execution(65257)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46327", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46327" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20110209 TPTI-11-02: Adobe Shockwave TextXtra Invalid Seek Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "name": "shockwave-memory-code-execution(65257)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46327", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46327" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110209 TPTI-11-02: Adobe Shockwave TextXtra Invalid Seek Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "name": "shockwave-memory-code-execution(65257)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46327", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46327" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0555", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2866
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.
References
▼ | URL | Tags |
---|---|---|
http://dvlabs.tippingpoint.com/advisory/TPTI-10-13 | x_refsource_MISC | |
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/513301/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11932", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "name": "20100824 TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an \"undocumented structure\" and the tSAC chunk in a Director movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11932", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "name": "20100824 TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an \"undocumented structure\" and the tSAC chunk in a Director movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11932", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "name": "20100824 TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2866", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3653
Vulnerability from cvelistv5
Published
2010-10-26 17:00
Modified
2024-08-07 03:18
Severity ?
EPSS score ?
Summary
The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/62688 | vdb-entry, x_refsource_XF | |
http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/ | x_refsource_MISC | |
http://www.exploit-db.com/exploits/15296 | exploit, x_refsource_EXPLOIT-DB | |
http://www.kb.cert.org/vuls/id/402231 | third-party-advisory, x_refsource_CERT-VN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/44291 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1024635 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2010/2752 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "adobe-shockwave-rcsl-code-exec(62688)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "name": "15296", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "name": "VU#402231", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "name": "oval:org.mitre.oval:def:11285", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "name": "44291", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44291" }, { "name": "1024635", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024635" }, { "name": "ADV-2010-2752", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2752" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "adobe-shockwave-rcsl-code-exec(62688)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "name": "15296", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "name": "VU#402231", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "name": "oval:org.mitre.oval:def:11285", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "name": "44291", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44291" }, { "name": "1024635", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024635" }, { "name": "ADV-2010-2752", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2752" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3653", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "adobe-shockwave-rcsl-code-exec(62688)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "name": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/", "refsource": "MISC", "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "name": "15296", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15296" }, { "name": "VU#402231", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/402231" }, { "name": "oval:org.mitre.oval:def:11285", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "name": "44291", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44291" }, { "name": "1024635", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024635" }, { "name": "ADV-2010-2752", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2752" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-3653", "datePublished": "2010-10-26T17:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:53.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2121
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://osvdb.org/73034 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73034", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73034" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-07T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73034", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73034" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73034", "refsource": "OSVDB", "url": "http://osvdb.org/73034" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2121", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4176
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
EPSS score ?
Summary
Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/872545 | third-party-advisory, x_refsource_CERT-VN | |
http://osvdb.org/86542 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79548 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-23.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86542", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86542" }, { "name": "adobe-cve20124176-code-exec(79548)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86542", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86542" }, { "name": "adobe-cve20124176-code-exec(79548)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4176", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86542", "refsource": "OSVDB", "url": "http://osvdb.org/86542" }, { "name": "adobe-cve20124176-code-exec(79548)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4176", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2874
Vulnerability from cvelistv5
Published
2010-09-07 17:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11924", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11924", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11924", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2874", "datePublished": "2010-09-07T17:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0766
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/79245 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79245", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79245" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-25T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "79245", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79245" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0766", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79245", "refsource": "OSVDB", "url": "http://osvdb.org/79245" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0766", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2119
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2119", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6271
Vulnerability from cvelistv5
Published
2012-12-20 11:00
Modified
2024-08-06 21:28
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/519137 | third-party-advisory, x_refsource_CERT-VN | |
http://www.kb.cert.org/vuls/id/323161 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#519137", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/519137" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#519137", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/519137" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-6271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#519137", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/519137" }, { "name": "VU#323161", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/323161" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-6271", "datePublished": "2012-12-20T11:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0771
Vulnerability from cvelistv5
Published
2018-02-19 19:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759.
References
▼ | URL | Tags |
---|---|---|
https://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0771", "datePublished": "2018-02-19T19:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2113
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2113", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2446
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-27.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026288 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2446", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5941
Vulnerability from cvelistv5
Published
2007-11-14 01:00
Modified
2024-08-07 15:47
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/4613 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/26388 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38359 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4613", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4613" }, { "name": "26388", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26388" }, { "name": "adobe-shockwave-swctl-bo(38359)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4613", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4613" }, { "name": "26388", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26388" }, { "name": "adobe-shockwave-swctl-bo(38359)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4613", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4613" }, { "name": "26388", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26388" }, { "name": "adobe-shockwave-swctl-bo(38359)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5941", "datePublished": "2007-11-14T01:00:00", "dateReserved": "2007-11-13T00:00:00", "dateUpdated": "2024-08-07T15:47:00.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0127
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/511260/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/secunia_research/2010-17/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:54.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7477", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player 3D Parsing Memory Corruption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-17/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7477", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player 3D Parsing Memory Corruption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-17/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7477", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player 3D Parsing Memory Corruption", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2010-17/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-17/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0127", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:54.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0764
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/52004 | vdb-entry, x_refsource_BID | |
http://osvdb.org/79244 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52004", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52004" }, { "name": "79244", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79244" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-25T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "52004", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52004" }, { "name": "79244", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79244" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0764", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "52004", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52004" }, { "name": "79244", "refsource": "OSVDB", "url": "http://osvdb.org/79244" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0764", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4086
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/514578/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4086", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12030", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4086", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12030", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4086", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12030", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4086", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2117
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2117", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1280
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html | mailing-list, x_refsource_FULLDISC | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/511257/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.zeroscience.mk/codes/shockwave_mem.txt | x_refsource_MISC | |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100511 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100512 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7184", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100511 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100512 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7184", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "20100511 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100512 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "name": "http://www.zeroscience.mk/codes/shockwave_mem.txt", "refsource": "MISC", "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php", "refsource": "MISC", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7184", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1280", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5121
Vulnerability from cvelistv5
Published
2015-07-14 23:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1032891 | vdb-entry, x_refsource_SECTRACK | |
https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-5121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032891", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032891" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-5121", "datePublished": "2015-07-14T23:00:00", "dateReserved": "2015-06-26T00:00:00", "dateUpdated": "2024-08-06T06:32:32.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7104
Vulnerability from cvelistv5
Published
2019-05-23 15:45
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T15:45:58", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7104", "datePublished": "2019-05-23T15:45:58", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2869
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/513329/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11983", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11983", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2869", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11983", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2869", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4175
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/872545 | third-party-advisory, x_refsource_CERT-VN | |
http://osvdb.org/86540 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-23.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79547 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86540", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124175-bo(79547)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86540", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124175-bo(79547)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4175", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86540", "refsource": "OSVDB", "url": "http://osvdb.org/86540" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124175-bo(79547)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4175", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2124
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/48294 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68048 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://osvdb.org/73019 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "48294", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48294" }, { "name": "adobe-player-unspec-ce(68048)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73019", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73019" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "48294", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48294" }, { "name": "adobe-player-unspec-ce(68048)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73019", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73019" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2124", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "48294", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48294" }, { "name": "adobe-player-unspec-ce(68048)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73019", "refsource": "OSVDB", "url": "http://osvdb.org/73019" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2124", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1292
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/511242/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416 | vdb-entry, signature, x_refsource_OVAL | |
http://www.zerodayinitiative.com/advisories/ZDI-10-089/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:18.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 ZDI-10-089: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7416", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 ZDI-10-089: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7416", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 ZDI-10-089: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7416", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1292", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:18.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2872
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.zerodayinitiative.com/advisories/ZDI-10-161 | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/513306/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "name": "oval:org.mitre.oval:def:11889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "name": "oval:org.mitre.oval:def:11889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-161", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "name": "oval:org.mitre.oval:def:11889", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2872", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0759
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0759", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4194
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46335 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/189929 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46335" }, { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46335" }, { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46335" }, { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4194", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2033
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49086 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1027037 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/53420 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-13.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75462 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "adobe-shockwave-file-ce(75462)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "adobe-shockwave-file-ce(75462)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "adobe-shockwave-file-ce(75462)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2033", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2186
Vulnerability from cvelistv5
Published
2009-06-24 22:00
Modified
2024-08-07 05:44
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that "was previously resolved in Shockwave Player 11.0.0.465."
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb09-08.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that \"was previously resolved in Shockwave Player 11.0.0.465.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-06-30T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that \"was previously resolved in Shockwave Player 11.0.0.465.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb09-08.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2186", "datePublished": "2009-06-24T22:00:00", "dateReserved": "2009-06-24T00:00:00", "dateUpdated": "2024-08-07T05:44:55.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1384
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-17 03:54
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-12.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.045Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1384", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-17T03:54:57.773Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4172
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/872545 | third-party-advisory, x_refsource_CERT-VN | |
http://osvdb.org/86537 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-23.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79544 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86537", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86537" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124172-bo(79544)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86537", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86537" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124172-bo(79544)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86537", "refsource": "OSVDB", "url": "http://osvdb.org/86537" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124172-bo(79544)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4172", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2882
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/513339/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12069", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12069", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2882", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12069", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2882", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4191
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46325 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46325", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46325" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46325", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46325" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4191", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46325", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46325" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4191", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4309
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4309", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3348
Vulnerability from cvelistv5
Published
2013-07-10 10:00
Modified
2024-08-06 16:07
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1028758 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb13-18.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1028758", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-20T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1028758", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1028758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-3348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1028758", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1028758" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-18.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-3348", "datePublished": "2013-07-10T10:00:00", "dateReserved": "2013-05-06T00:00:00", "dateUpdated": "2024-08-06T16:07:37.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0758
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-16 20:36
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:13.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0758", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-16T20:36:56.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6270
Vulnerability from cvelistv5
Published
2012-12-20 11:00
Modified
2024-08-06 21:28
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a "downgrading" attack.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/546769 | third-party-advisory, x_refsource_CERT-VN | |
http://www.kb.cert.org/vuls/id/323161 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#546769", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/546769" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a \"downgrading\" attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#546769", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/546769" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-6270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a \"downgrading\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#546769", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/546769" }, { "name": "VU#323161", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/323161" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-6270", "datePublished": "2012-12-20T11:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4190
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds "seek" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-11-080/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/516324/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/46324 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110209 ZDI-11-080: Adobe Shockwave CSWV Chunk Substructure Offset Value Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46324", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46324" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds \"seek\" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110209 ZDI-11-080: Adobe Shockwave CSWV Chunk Substructure Offset Value Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46324", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46324" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds \"seek\" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110209 ZDI-11-080: Adobe Shockwave CSWV Chunk Substructure Offset Value Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46324", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46324" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4190", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2863
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11522", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11522", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11522", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2863", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2449
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-27.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026288 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:34.008Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2449", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:34.008Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4192
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46326 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/516322/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.zerodayinitiative.com/advisories/ZDI-11-078 | x_refsource_MISC | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46326", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46326" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110208 ZDI-11-078: Adobe Shockwave Player FFFFFF88 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46326", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46326" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110208 ZDI-11-078: Adobe Shockwave Player FFFFFF88 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4192", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46326", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46326" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110208 ZDI-11-078: Adobe Shockwave Player FFFFFF88 Record Count Element Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-078", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4192", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0761
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/79241 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73174 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/52001 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79241", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79241" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "adobe-shockwave-3d-code-exec(73174)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "name": "52001", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "79241", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79241" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "adobe-shockwave-3d-code-exec(73174)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "name": "52001", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52001" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0761", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79241", "refsource": "OSVDB", "url": "http://osvdb.org/79241" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "adobe-shockwave-3d-code-exec(73174)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "name": "52001", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52001" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0761", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2983
Vulnerability from cvelistv5
Published
2017-03-14 16:00
Modified
2024-08-05 14:09
Severity ?
EPSS score ?
Summary
Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb17-08.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96863 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037993 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Adobe Shockwave 12.2.7.197 and earlier. |
Version: Adobe Shockwave 12.2.7.197 and earlier. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:18.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "name": "96863", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96863" }, { "name": "1037993", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037993" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave 12.2.7.197 and earlier.", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Adobe Shockwave 12.2.7.197 and earlier." } ] } ], "datePublic": "2017-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Insecure Library Loading (DLL hijacking)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-14T09:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "name": "96863", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96863" }, { "name": "1037993", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037993" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2017-2983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave 12.2.7.197 and earlier.", "version": { "version_data": [ { "version_value": "Adobe Shockwave 12.2.7.197 and earlier." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure Library Loading (DLL hijacking)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "name": "96863", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96863" }, { "name": "1037993", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037993" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2017-2983", "datePublished": "2017-03-14T16:00:00", "dateReserved": "2016-12-02T00:00:00", "dateUpdated": "2024-08-05T14:09:18.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0128
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
EPSS score ?
Summary
Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.coresecurity.com/content/adobe-director-invalid-read | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/511261/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/511240/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/secunia_research/2010-19/ | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CORE-2010-0405] Adobe Director Invalid Read", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "name": "oval:org.mitre.oval:def:7273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CORE-2010-0405] Adobe Director Invalid Read", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "name": "oval:org.mitre.oval:def:7273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.coresecurity.com/content/adobe-director-invalid-read", "refsource": "MISC", "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CORE-2010-0405] Adobe Director Invalid Read", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://secunia.com/secunia_research/2010-19/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-19/" }, { "name": "oval:org.mitre.oval:def:7273", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0128", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2044
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-16 22:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2044", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-16T22:34:51.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4193
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/189929 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/46334 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46334" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4193", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46334" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4193", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4090
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12199", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12199", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12199", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4090", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2587
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 02:39
Severity ?
EPSS score ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/65243 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/46316 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-director-ce(65243)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46316" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "shockwave-director-ce(65243)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46316" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2587", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-director-ce(65243)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46316" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2587", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2867
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a "pointer offset vulnerability."
References
▼ | URL | Tags |
---|---|---|
http://dvlabs.tippingpoint.com/advisory/TPTI-10-14 | x_refsource_MISC | |
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/513299/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12021", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a \"pointer offset vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12021", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a \"pointer offset vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12021", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2867", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3463
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/54118 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/36905 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb09-16.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2009/3134 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1023123 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-index-code-execution(54118)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:5677", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shockwave-index-code-execution(54118)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:5677", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-index-code-execution(54118)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:5677", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3463", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2875
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11521", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11521", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11521", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 Adobe Shockwave Player Memory Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2875", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2111
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:15.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2111", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:15.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0501
Vulnerability from cvelistv5
Published
2014-02-12 02:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/91008 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/56740 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1029740 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/65493 | vdb-entry, x_refsource_BID | |
http://helpx.adobe.com/security/products/shockwave/apsb14-06.html | x_refsource_CONFIRM | |
http://osvdb.org/103158 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20140501-code-exec(91008)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029740" }, { "name": "65493", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65493" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "name": "103158", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/103158" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-02T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20140501-code-exec(91008)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029740" }, { "name": "65493", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65493" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "name": "103158", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/103158" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20140501-code-exec(91008)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "name": "56740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029740" }, { "name": "65493", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65493" }, { "name": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "name": "103158", "refsource": "OSVDB", "url": "http://osvdb.org/103158" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0501", "datePublished": "2014-02-12T02:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2030
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49086 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75459 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1027037 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/53420 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-13.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "shockwave-player-file-code-execution(75459)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "shockwave-player-file-code-execution(75459)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "shockwave-player-file-code-execution(75459)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2030", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1386
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-16 16:24
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-12.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1386", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-16T16:24:02.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2114
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2114", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0556
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/65258 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://dvlabs.tippingpoint.com/advisory/TPTI-11-03 | x_refsource_MISC | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/46328 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/516336/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shocwave-player-fontxtra-code-exec(65258)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46328", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46328" }, { "name": "20110209 TPTI-11-03: Adobe Shockwave Font Xtra String Decoding Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shocwave-player-fontxtra-code-exec(65258)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46328", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46328" }, { "name": "20110209 TPTI-11-03: Adobe Shockwave Font Xtra String Decoding Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shocwave-player-fontxtra-code-exec(65258)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46328", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46328" }, { "name": "20110209 TPTI-11-03: Adobe Shockwave Font Xtra String Decoding Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0556", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4174
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/79546 | vdb-entry, x_refsource_XF | |
http://osvdb.org/86539 | vdb-entry, x_refsource_OSVDB | |
http://www.kb.cert.org/vuls/id/872545 | third-party-advisory, x_refsource_CERT-VN | |
http://www.adobe.com/support/security/bulletins/apsb12-23.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20124174-bo(79546)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "name": "86539", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86539" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20124174-bo(79546)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "name": "86539", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86539" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20124174-bo(79546)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "name": "86539", "refsource": "OSVDB", "url": "http://osvdb.org/86539" }, { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4174", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0318
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0318", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:08.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5120
Vulnerability from cvelistv5
Published
2015-07-14 23:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1032891 | vdb-entry, x_refsource_SECTRACK | |
https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-5120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032891", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032891" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-5120", "datePublished": "2015-07-14T23:00:00", "dateReserved": "2015-06-26T00:00:00", "dateUpdated": "2024-08-06T06:32:32.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4173
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/79545 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/872545 | third-party-advisory, x_refsource_CERT-VN | |
http://osvdb.org/86538 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-23.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20124173-bo(79545)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86538", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86538" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20124173-bo(79545)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86538", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86538" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20124173-bo(79545)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86538", "refsource": "OSVDB", "url": "http://osvdb.org/86538" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4173", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-5333
Vulnerability from cvelistv5
Published
2013-12-11 15:00
Modified
2024-08-06 17:06
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334.
References
▼ | URL | Tags |
---|---|---|
http://helpx.adobe.com/security/products/shockwave/apsb13-29.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:06:52.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-11T12:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-5333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-5333", "datePublished": "2013-12-11T15:00:00", "dateReserved": "2013-08-20T00:00:00", "dateUpdated": "2024-08-06T17:06:52.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4088
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with "duplicated references to the same KEY* chunk," a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/514580/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12169", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12169", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12169", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4088", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:36.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1290
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7154", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7154", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1290", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7154", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1290", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2122
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/518439/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/73029 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/48297 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110614 [BGA - SignalSEC Advisory]:Adobe Shockwave Player Remote Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "name": "73029", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73029" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48297" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20110614 [BGA - SignalSEC Advisory]:Adobe Shockwave Player Remote Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "name": "73029", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73029" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48297" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2122", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110614 [BGA - SignalSEC Advisory]:Adobe Shockwave Player Remote Code Execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "name": "73029", "refsource": "OSVDB", "url": "http://osvdb.org/73029" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48297" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2122", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2123
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "20110614 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-07-20T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "20110614 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2123", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "20110614 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2123", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4307
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/46339 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46339", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46339" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46339", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46339" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46339", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46339" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4307", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2046
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-16 17:49
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.747Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2046", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-16T17:49:06.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5273
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/86541 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-23.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/56187 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.414Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "86541", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86541" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "56187", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-01-26T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "86541", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86541" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "56187", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5273", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "86541", "refsource": "OSVDB", "url": "http://osvdb.org/86541" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "56187", "refsource": "BID", "url": "http://www.securityfocus.com/bid/56187" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5273", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0557
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a "faulty allocation" and memory corruption.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/65259 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/46330 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/516323/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-overflow-code-exec(65259)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46330", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46330" }, { "name": "20110208 ZDI-11-079: Adobe Shockwave Player 0xFFFFFF45 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a \"faulty allocation\" and memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shockwave-overflow-code-exec(65259)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46330", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46330" }, { "name": "20110208 ZDI-11-079: Adobe Shockwave Player 0xFFFFFF45 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a \"faulty allocation\" and memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-overflow-code-exec(65259)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46330", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46330" }, { "name": "20110208 ZDI-11-079: Adobe Shockwave Player 0xFFFFFF45 Record Count Element Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0557", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2873
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/513307/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.zerodayinitiative.com/advisories/ZDI-10-162 | x_refsource_MISC | |
http://www.securityfocus.com/bid/42682 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12042", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "name": "42682", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42682" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12042", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "name": "42682", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42682" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12042", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-162", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "name": "42682", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42682" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2873", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-5275
Vulnerability from cvelistv5
Published
2007-10-08 23:00
Modified
2024-08-07 15:24
Severity ?
EPSS score ?
Summary
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:42.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SA:2007:069", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "name": "29865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29865" }, { "name": "28157", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28157" }, { "name": "30507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30507" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "name": "28570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28570" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name": "ADV-2008-1724", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name": "TA07-355A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "name": "oval:org.mitre.oval:def:9250", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "name": "GLSA-200801-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "name": "RHSA-2008:0221", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name": "TA08-150A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "SUSE-SA:2008:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name": "28161", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28161" }, { "name": "RHSA-2007:1126", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "name": "29763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29763" }, { "name": "238305", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name": "26930", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26930" }, { "name": "ADV-2007-4258", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "name": "1019116", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019116" }, { "name": "GLSA-200804-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name": "ADV-2008-1697", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "TA08-100A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name": "28213", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28213" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SA:2007:069", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "name": "29865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29865" }, { "name": "28157", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28157" }, { "name": "30507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30507" }, { "tags": [ "x_refsource_MISC" ], "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "name": "28570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28570" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name": "ADV-2008-1724", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name": "TA07-355A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "name": "oval:org.mitre.oval:def:9250", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "name": "GLSA-200801-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "name": "RHSA-2008:0221", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name": "TA08-150A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "SUSE-SA:2008:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name": "28161", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28161" }, { "name": "RHSA-2007:1126", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "name": "29763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29763" }, { "name": "238305", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name": "26930", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26930" }, { "name": "ADV-2007-4258", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "name": "1019116", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019116" }, { "name": "GLSA-200804-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name": "ADV-2008-1697", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "TA08-100A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name": "28213", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28213" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SA:2007:069", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "name": "29865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29865" }, { "name": "28157", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28157" }, { "name": "30507", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30507" }, { "name": "http://crypto.stanford.edu/dns/dns-rebinding.pdf", "refsource": "MISC", "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "name": "28570", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28570" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb08-11.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name": "ADV-2008-1724", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name": "TA07-355A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "name": "oval:org.mitre.oval:def:9250", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "name": "GLSA-200801-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "name": "RHSA-2008:0221", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name": "TA08-150A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "SUSE-SA:2008:022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name": "28161", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28161" }, { "name": "RHSA-2007:1126", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "name": "29763", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29763" }, { "name": "238305", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name": "26930", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26930" }, { "name": "ADV-2007-4258", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "name": "1019116", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019116" }, { "name": "GLSA-200804-21", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name": "ADV-2008-1697", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "TA08-100A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name": "28213", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28213" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb07-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5275", "datePublished": "2007-10-08T23:00:00", "dateReserved": "2007-10-08T00:00:00", "dateUpdated": "2024-08-07T15:24:42.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0500
Vulnerability from cvelistv5
Published
2014-02-12 02:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/65490 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91007 | vdb-entry, x_refsource_XF | |
http://osvdb.org/103157 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/56740 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1029740 | vdb-entry, x_refsource_SECTRACK | |
http://helpx.adobe.com/security/products/shockwave/apsb14-06.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "65490", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65490" }, { "name": "adobe-cve20140500-code-exec(91007)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "name": "103157", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/103157" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-02T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "65490", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65490" }, { "name": "adobe-cve20140500-code-exec(91007)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "name": "103157", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/103157" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0500", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "65490", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65490" }, { "name": "adobe-cve20140500-code-exec(91007)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "name": "103157", "refsource": "OSVDB", "url": "http://osvdb.org/103157" }, { "name": "56740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029740" }, { "name": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0500", "datePublished": "2014-02-12T02:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4188
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/46319 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/516332/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://dvlabs.tippingpoint.com/advisory/TPTI-11-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46319", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46319" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-01: Adobe Shockwave dirapi.dll IFWV Trusted Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46319", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46319" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-01: Adobe Shockwave dirapi.dll IFWV Trusted Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46319", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46319" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-01: Adobe Shockwave dirapi.dll IFWV Trusted Offset Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4188", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2423
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/74429 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/69133 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "74429", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/74429" }, { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "asp-msvcr90-code-execution(69133)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "74429", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/74429" }, { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "asp-msvcr90-code-execution(69133)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2423", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "74429", "refsource": "OSVDB", "url": "http://osvdb.org/74429" }, { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "asp-msvcr90-code-execution(69133)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2423", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4308
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-07 03:43
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.600Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4308", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4189
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/516334/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://dvlabs.tippingpoint.com/advisory/TPTI-11-04 | x_refsource_MISC | |
http://www.securityfocus.com/bid/46320 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-04: Adobe Shockwave GIF Logical Screen Descriptor Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "name": "46320", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46320" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-04: Adobe Shockwave GIF Logical Screen Descriptor Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "name": "46320", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46320" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4189", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-04: Adobe Shockwave GIF Logical Screen Descriptor Parsing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "name": "46320", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46320" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4189", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2127
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/68051 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/48289 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://osvdb.org/73032 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-shockwave-memory-ce(68051)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "name": "48289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73032", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73032" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-shockwave-memory-ce(68051)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "name": "48289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73032", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73032" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-shockwave-memory-ce(68051)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "name": "48289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48289" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73032", "refsource": "OSVDB", "url": "http://osvdb.org/73032" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2127", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:17.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1287
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6803", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6803", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6803", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1287", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0335
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2011-0335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2011-0335", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:08.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0763
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-17 00:21
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0763", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-17T00:21:54.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3465
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/36905 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb09-16.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/3134 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54120 | vdb-entry, x_refsource_XF | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722 | vdb-entry, signature, x_refsource_OVAL | |
http://securitytracker.com/id?1023123 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "shockwave-invalid-pointer-code-execution(54120)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "name": "oval:org.mitre.oval:def:5722", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "shockwave-invalid-pointer-code-execution(54120)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "name": "oval:org.mitre.oval:def:5722", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "shockwave-invalid-pointer-code-execution(54120)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "name": "oval:org.mitre.oval:def:5722", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3465", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1281
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.zerodayinitiative.com/advisories/ZDI-10-087/ | x_refsource_MISC | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/511252/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7268", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "name": "20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7268", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "name": "20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7268", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "name": "20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1281", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4093
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/189929 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/46321 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.033Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46321", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46321" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46321", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46321" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46321", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46321" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4093", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2881
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/513328/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11614", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11614", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11614", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2881", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3359
Vulnerability from cvelistv5
Published
2013-09-11 23:00
Modified
2024-09-17 04:18
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-23.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-11T23:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-3359", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-3359", "datePublished": "2013-09-11T23:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T04:18:55.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2588
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 02:39
Severity ?
EPSS score ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/46318 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65244 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46318", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46318" }, { "name": "adobe-director-ce(65244)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "46318", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46318" }, { "name": "adobe-director-ce(65244)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46318", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46318" }, { "name": "adobe-director-ce(65244)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2588", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1385
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-16 18:17
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-12.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1385", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-16T18:17:46.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1291
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183 | vdb-entry, signature, x_refsource_OVAL | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:18.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7183", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7183", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1291", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7183", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1291", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:18.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1860
Vulnerability from cvelistv5
Published
2009-06-24 22:00
Modified
2024-08-07 05:27
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1022440 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/35544 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb09-08.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/35469 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022440", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022440" }, { "name": "35544", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35544" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "name": "35469", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35469" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-06-30T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1022440", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022440" }, { "name": "35544", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35544" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "name": "35469", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35469" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022440", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022440" }, { "name": "35544", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35544" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-08.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "name": "35469", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35469" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1860", "datePublished": "2009-06-24T22:00:00", "dateReserved": "2009-06-01T00:00:00", "dateUpdated": "2024-08-07T05:27:54.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2120
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2120", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:17.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0986
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:06
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://secunia.com/secunia_research/2010-34/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/511264/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/40086 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:06:52.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Asset Entry Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "name": "40086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40086" }, { "name": "oval:org.mitre.oval:def:6967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Asset Entry Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "name": "40086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40086" }, { "name": "oval:org.mitre.oval:def:6967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "http://secunia.com/secunia_research/2010-34/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-34/" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Asset Entry Parsing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "name": "40086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40086" }, { "name": "oval:org.mitre.oval:def:6967", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0986", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-03-18T00:00:00", "dateUpdated": "2024-08-07T01:06:52.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0762
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/79242 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/52002 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73175 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79242", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79242" }, { "name": "52002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52002" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "shockwave-3d-code-exec(73175)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "79242", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79242" }, { "name": "52002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52002" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "shockwave-3d-code-exec(73175)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79242", "refsource": "OSVDB", "url": "http://osvdb.org/79242" }, { "name": "52002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52002" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "shockwave-3d-code-exec(73175)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0762", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0635
Vulnerability from cvelistv5
Published
2013-02-13 21:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-06.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA13-043A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-04T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0635", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-06.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0635", "datePublished": "2013-02-13T21:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2878
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/513298/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://dvlabs.tippingpoint.com/advisory/TPTI-10-10 | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "name": "oval:org.mitre.oval:def:11883", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "name": "oval:org.mitre.oval:def:11883", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "name": "oval:org.mitre.oval:def:11883", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2878", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-3086
Vulnerability from cvelistv5
Published
2017-06-20 17:00
Modified
2024-08-05 14:16
Severity ?
EPSS score ?
Summary
Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038656 | vdb-entry, x_refsource_SECTRACK | |
https://helpx.adobe.com/security/products/shockwave/apsb17-18.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/99019 | vdb-entry, x_refsource_BID | |
https://fortiguard.com/zeroday/FG-VD-16-036 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Adobe Shockwave 12.2.8.198 and earlier. |
Version: Adobe Shockwave 12.2.8.198 and earlier. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:27.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038656", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "name": "99019", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fortiguard.com/zeroday/FG-VD-16-036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave 12.2.8.198 and earlier.", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Adobe Shockwave 12.2.8.198 and earlier." } ] } ], "datePublic": "2017-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-20T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1038656", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "name": "99019", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://fortiguard.com/zeroday/FG-VD-16-036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2017-3086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave 12.2.8.198 and earlier.", "version": { "version_data": [ { "version_value": "Adobe Shockwave 12.2.8.198 and earlier." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "1038656", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038656" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "name": "99019", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99019" }, { "name": "https://fortiguard.com/zeroday/FG-VD-16-036", "refsource": "MISC", "url": "https://fortiguard.com/zeroday/FG-VD-16-036" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2017-3086", "datePublished": "2017-06-20T17:00:00", "dateReserved": "2016-12-02T00:00:00", "dateUpdated": "2024-08-05T14:16:27.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4085
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:11518", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:11518", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:11518", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4085", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0320
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0320", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4003
Vulnerability from cvelistv5
Published
2010-01-21 19:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37888" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "name": "37872", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37872" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "name": "shockwave-shockwave-bo(55759)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37888" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "name": "37872", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37872" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "name": "shockwave-shockwave-bo(55759)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2009-4003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2009-63/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-63/" }, { "name": "37888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37888" }, { "name": "1023481", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8538", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "name": "http://secunia.com/secunia_research/2010-1/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-1/" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "name": "37872", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37872" }, { "name": "http://secunia.com/secunia_research/2009-62/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-62/" }, { "name": "ADV-2010-0171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-03.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "name": "shockwave-shockwave-bo(55759)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2009-4003", "datePublished": "2010-01-21T19:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2109
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://osvdb.org/73033 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:15.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73033", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73033" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-07T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73033", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73033" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73033", "refsource": "OSVDB", "url": "http://osvdb.org/73033" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2109", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:15.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7100
Vulnerability from cvelistv5
Published
2019-05-23 16:29
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:29:37", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7100", "datePublished": "2019-05-23T16:29:37", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2879
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://dvlabs.tippingpoint.com/advisory/TPTI-10-12 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/513300/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11998", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11998", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2879", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11998", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2879", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0317
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0317", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0319
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0319", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0760
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-16 16:48
Severity ?
EPSS score ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-02.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0760", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-16T16:48:56.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4089
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing "duplicated LCSM entries in mmap record," a different vulnerability than CVE-2010-4087.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/514582/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4089", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing \"duplicated LCSM entries in mmap record,\" a different vulnerability than CVE-2010-4087." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:11748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4089", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing \"duplicated LCSM entries in mmap record,\" a different vulnerability than CVE-2010-4087." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11748", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4089", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4089", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:36.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4084
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12265", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12265", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12265", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4084", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:36.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0987
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:06
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://secunia.com/secunia_research/2010-50/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/511265/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/40093 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:06:52.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "name": "40093", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40093" }, { "name": "oval:org.mitre.oval:def:7052", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "name": "40093", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40093" }, { "name": "oval:org.mitre.oval:def:7052", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "http://secunia.com/secunia_research/2010-50/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-50/" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "name": "40093", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40093" }, { "name": "oval:org.mitre.oval:def:7052", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0987", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-03-18T00:00:00", "dateUpdated": "2024-08-07T01:06:52.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4087
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/archive/1/514581/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12093", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4087", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12093", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4087", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12093", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4087", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4087", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2422
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2422", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2422", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7649
Vulnerability from cvelistv5
Published
2015-10-28 18:00
Modified
2024-08-06 07:58
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb15-26.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1033990 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "name": "1033990", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033990" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "name": "1033990", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033990" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-7649", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "name": "1033990", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033990" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-7649", "datePublished": "2015-10-28T18:00:00", "dateReserved": "2015-10-01T00:00:00", "dateUpdated": "2024-08-06T07:58:59.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2118
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an "input validation vulnerability."
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an \"input validation vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an \"input validation vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2118", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4195
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/189929 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/46336 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46336", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46336" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46336", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46336" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46336", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46336" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4195", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2421
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2421", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2112
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2112", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:17.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2448
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-27.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026288 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2448", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2448", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0129
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
EPSS score ?
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/511256/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/40082 | vdb-entry, x_refsource_BID | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/secunia_research/2010-20/ | x_refsource_MISC | |
http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/511262/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "name": "40082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40082" }, { "name": "20100511 Abobe Shockwave Player Heap Memory Indexing Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Array Indexing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "name": "40082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40082" }, { "name": "20100511 Abobe Shockwave Player Heap Memory Indexing Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Array Indexing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "name": "40082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40082" }, { "name": "20100511 Abobe Shockwave Player Heap Memory Indexing Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://secunia.com/secunia_research/2010-20/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-20/" }, { "name": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html", "refsource": "MISC", "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Array Indexing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7134", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0129", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2582
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 02:39
Severity ?
EPSS score ?
Summary
An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securitytracker.com/id?1024664 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-25.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/514560/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/secunia_research/2010-114/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:12078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"DEMX\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-114/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "oval:org.mitre.oval:def:12078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"DEMX\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-114/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:12078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"DEMX\" Chunk Parsing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2010-114/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-114/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2582", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3360
Vulnerability from cvelistv5
Published
2013-09-11 23:00
Modified
2024-09-16 20:52
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb13-23.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-11T23:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-3360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-3360", "datePublished": "2013-09-11T23:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-16T20:52:46.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2876
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/513312/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805 | vdb-entry, signature, x_refsource_OVAL | |
http://www.zerodayinitiative.com/advisories/ZDI-10-164 | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20100824 ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11805", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20100824 ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11805", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20100824 ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11805", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-164", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2876", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2108
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a "design flaw."
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/48311 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68033 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://osvdb.org/73012 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:15.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48311" }, { "name": "shockwave-design-code-exec(68033)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73012", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73012" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a \"design flaw.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "48311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48311" }, { "name": "shockwave-design-code-exec(68033)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73012", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73012" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a \"design flaw.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48311", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48311" }, { "name": "shockwave-design-code-exec(68033)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73012", "refsource": "OSVDB", "url": "http://osvdb.org/73012" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2108", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:15.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2871
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/513305/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.zerodayinitiative.com/advisories/ZDI-10-160 | x_refsource_MISC | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "name": "oval:org.mitre.oval:def:11970", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "name": "oval:org.mitre.oval:def:11970", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-160", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "name": "oval:org.mitre.oval:def:11970", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2871", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2047
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-17 02:20
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb12-17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2047", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-17T02:20:48.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3525
Vulnerability from cvelistv5
Published
2006-02-23 20:00
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/23461 | vdb-entry, x_refsource_OSVDB | |
http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/16791 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/481 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2006/0716 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24914 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/19009 | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/437212 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/archive/1/425900/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.zerodayinitiative.com/advisories/ZDI-06-002.html | x_refsource_MISC | |
http://securitytracker.com/id?1015673 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23461", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23461" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "name": "16791", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16791" }, { "name": "481", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/481" }, { "name": "ADV-2006-0716", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "name": "shockwave-activex-installer-bo(24914)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "name": "19009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19009" }, { "name": "VU#437212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "name": "20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "name": "1015673", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015673" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23461", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23461" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "name": "16791", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16791" }, { "name": "481", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/481" }, { "name": "ADV-2006-0716", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "name": "shockwave-activex-installer-bo(24914)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "name": "19009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19009" }, { "name": "VU#437212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "name": "20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "name": "1015673", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015673" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23461", "refsource": "OSVDB", "url": "http://www.osvdb.org/23461" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "name": "16791", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16791" }, { "name": "481", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/481" }, { "name": "ADV-2006-0716", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "name": "shockwave-activex-installer-bo(24914)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "name": "19009", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19009" }, { "name": "VU#437212", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/437212" }, { "name": "20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "name": "1015673", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015673" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3525", "datePublished": "2006-02-23T20:00:00", "dateReserved": "2005-11-08T00:00:00", "dateUpdated": "2024-08-07T23:17:23.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2126
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/73011 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68050 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/bid/48309 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "73011", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73011" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-shockwave-unspec-bo(68050)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48309", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48309" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "73011", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73011" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-shockwave-unspec-bo(68050)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48309", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48309" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "73011", "refsource": "OSVDB", "url": "http://osvdb.org/73011" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-shockwave-unspec-bo(68050)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48309", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48309" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2126", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7099
Vulnerability from cvelistv5
Published
2019-05-23 16:30
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:30:14", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7099", "datePublished": "2019-05-23T16:30:14", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-3466
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/54121 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/36905 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb09-16.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2009/3134 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1023123 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:09.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-string-code-execution(54121)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6395", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an \"invalid string length vulnerability.\" NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shockwave-string-code-execution(54121)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6395", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an \"invalid string length vulnerability.\" NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-string-code-execution(54121)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6395", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3466", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:09.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1283
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262 | vdb-entry, signature, x_refsource_OVAL | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
http://www.zerodayinitiative.com/advisories/ZDI-10-088/ | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/511253/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7262", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "name": "20100511 ZDI-10-088: Adobe Shockwave Player 3D Parsing Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7262", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "name": "20100511 ZDI-10-088: Adobe Shockwave Player 3D Parsing Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1283", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7262", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "name": "20100511 ZDI-10-088: Adobe Shockwave Player 3D Parsing Memory Corruption Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1283", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7102
Vulnerability from cvelistv5
Published
2019-05-23 16:30
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:30:43", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7102", "datePublished": "2019-05-23T16:30:43", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4196
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/189929 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/46338 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "46338", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46338" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "46338", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46338" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "46338", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46338" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4196", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2419
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA11-222A.html | third-party-advisory, x_refsource_CERT | |
http://www.adobe.com/support/security/bulletins/apsb11-19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2419", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6680
Vulnerability from cvelistv5
Published
2015-09-09 00:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1033486 | vdb-entry, x_refsource_SECTRACK | |
https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201509-07 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-6680", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033486", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033486" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-07" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-6680", "datePublished": "2015-09-09T00:00:00", "dateReserved": "2015-08-26T00:00:00", "dateUpdated": "2024-08-06T07:29:24.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2868
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1024361 | vdb-entry, x_refsource_SECTRACK | |
http://www.adobe.com/support/security/bulletins/apsb10-20.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/513333/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2176 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11540", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11540", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11540", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2868", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7098
Vulnerability from cvelistv5
Published
2019-05-23 16:47
Modified
2024-08-04 20:38
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:47:08", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7098", "datePublished": "2019-05-23T16:47:08", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2029
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/49086 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75458 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1027037 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/53420 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-13.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-unspecified-ce(75458)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-unspecified-ce(75458)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "asp-unspecified-ce(75458)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2029", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2116
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115.
References
▼ | URL | Tags |
---|---|---|
http://www.adobe.com/support/security/bulletins/apsb11-17.html | x_refsource_CONFIRM | |
http://www.us-cert.gov/cas/techalerts/TA11-166A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2116", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6681
Vulnerability from cvelistv5
Published
2015-09-09 00:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1033486 | vdb-entry, x_refsource_SECTRACK | |
https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201509-07 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-6681", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033486", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033486" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-07" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-6681", "datePublished": "2015-09-09T00:00:00", "dateReserved": "2015-08-26T00:00:00", "dateUpdated": "2024-08-06T07:29:24.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4092
Vulnerability from cvelistv5
Published
2010-11-05 20:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/68982 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/42112 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0335 | vdb-entry, x_refsource_VUPEN | |
http://www.adobe.com/support/security/bulletins/apsb11-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/44617 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1025056 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548 | vdb-entry, signature, x_refsource_OVAL | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/62978 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.238Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "68982", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/68982" }, { "name": "42112", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42112" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "44617", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44617" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "oval:org.mitre.oval:def:11548", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "name": "adobe-shockwave-settings-code-execution(62978)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "68982", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/68982" }, { "name": "42112", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42112" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "44617", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44617" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "oval:org.mitre.oval:def:11548", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "name": "adobe-shockwave-settings-code-execution(62978)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "68982", "refsource": "OSVDB", "url": "http://osvdb.org/68982" }, { "name": "42112", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42112" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "44617", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44617" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "oval:org.mitre.oval:def:11548", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "name": "adobe-shockwave-settings-code-execution(62978)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4092", "datePublished": "2010-11-05T20:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.238Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0130
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
EPSS score ?
Summary
Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/38751 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/511263/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.adobe.com/support/security/bulletins/apsb10-12.html | x_refsource_CONFIRM | |
http://secunia.com/secunia_research/2010-22/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/40084 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2010/1128 | vdb-entry, x_refsource_VUPEN | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "name": "40084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40084" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7108", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "name": "40084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40084" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7108", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "http://secunia.com/secunia_research/2010-22/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-22/" }, { "name": "40084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40084" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7108", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0130", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4002
Vulnerability from cvelistv5
Published
2010-01-21 19:00
Modified
2024-08-07 06:45
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/37870 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/509062/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/37888 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55758 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1023481 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/0171 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/secunia_research/2009-61/ | x_refsource_MISC | |
http://www.adobe.com/support/security/bulletins/apsb10-03.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37870", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37870" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37888" }, { "name": "shockwave-3d-bo(55758)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8311", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "37870", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37870" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37888" }, { "name": "shockwave-3d-bo(55758)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8311", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2009-4002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37870", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37870" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "name": "37888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37888" }, { "name": "shockwave-3d-bo(55758)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "name": "1023481", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8311", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "name": "ADV-2010-0171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "name": "http://secunia.com/secunia_research/2009-61/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-61/" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-03.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2009-4002", "datePublished": "2010-01-21T19:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }